not mainly focused on spyware detection even if they
define a set of rules able to detect specific behaviours.
At the best of our knowledge the only work fo-
cusing on Android spyware detection is the one pro-
posed in (Chatterjee et al., 2018). Authors are focu-
sed in spyware used as intimate partner surveillance
(IPS). The authors crawled apps from Google Play
Store and using a combination of manual inspection
and machine learning based approach discovered a
large number of apps which are designed for legiti-
mate use but also repurposed for IPS. Differently from
this method we consider the model checking techni-
que in order to identify spyware apps. Authors extract
distinctive features from applications in order to apply
machine learning based approach, instead, we define
temporal logic formulae, which are behavioural ba-
sed, to recognize Android spyware. Furthermore, we
are focused about spyware with information gathering
ability (i.e., the most widespread spyware in mobile
environment (Wei et al., 2012)).
Zhang et al. in (Zhang et al., 2018) demonstrate
that Google Assistant can be targeted since it suffers
from some vulnerabilities. They develop an attacking
framework able to record the voice of the user. This
framework launches the attack using the recorded
voice. This is a very dangerous vulnerability since
the built-in voice assistant is able to access system re-
sources and private information. Thus, hacking this
assistant can lead to the leak of private and sensitive
information. Differently, the proposed framework is
able to recognize spyware applications in mobile en-
vironment to stem these types of attacks.
6 CONCLUSION AND FUTURE
WORK
Nowadays smartphones collect a large amount of per-
sonal information. This is the reason why malware
writers target these devices. More specifically, there
is a kind of malicious software aiming to steal and
collect these sensitive information and it is known as
spyware.
Thus, in this paper we described a spyware de-
tection framework. We exploit model checking
technique and we use temporal logic formulae to de-
tect Android spyware. We generated a synthetic data-
set injected by spyware malicious payload in order to
evaluate the effectiveness of the proposed method.
As future work, we plan to extend the experi-
mental dataset including applications belonging from
third-party marketplaces. We want also largely inves-
tigate for many other applications belonging to the
Android official market. Thus, we want to perform
an in-deep analysis of the applications available in the
stores. Furthermore, also secure information analysis
will be investigated (Avvenuti et al., 2012).
Furthermore, we intend to compare our approach
with other solutions proposed in literature, for exam-
ple the approach proposed by (Chatterjee et al., 2018).
ACKNOWLEDGMENT
This work was partially supported by the H2020 EU
funded project NeCS [GA #675320], by the H2020
EU funded project C3ISP [GA #700294].
REFERENCES
Andersen, J. R., Andersen, N., Enevoldsen, S., Hansen,
M. M., Larsen, K. G., Olesen, S. R., Srba, J., and
Wortmann, J. K. (2015). CAAL: concurrency work-
bench, aalborg edition. In Theoretical Aspects of
Computing - ICTAC 2015 - 12th International Col-
loquium Cali, Colombia, October 29-31, 2015, Pro-
ceedings, volume 9399 of Lecture Notes in Computer
Science, pages 573–582. Springer.
Avvenuti, M., Bernardeschi, C., De Francesco, N., and
Masci, P. (2012). JCSI: A tool for checking secure
information flow in java card applications. Journal of
Systems and Software, 85(11):2479–2493.
Canfora, G., Di Sorbo, A., Mercaldo, F., and Visag-
gio, C. A. (2015a). Obfuscation techniques against
signature-based detection: a case study. In 2015
Mobile Systems Technologies Workshop (MST), pages
21–26. IEEE.
Canfora, G., Martinelli, F., Mercaldo, F., Nardone, V., San-
tone, A., and Visaggio, C. A. (2018). Leila: formal
tool for identifying mobile malicious behaviour. IEEE
Transactions on Software Engineering.
Canfora, G., Mercaldo, F., Moriano, G., and Visaggio, C.
(2015b). Composition-malware: Building android
malware at run time. pages 318–326. cited By 12.
Ceccarelli, M., Cerulo, L., and Santone, A. (2014). De
novo reconstruction of gene regulatory networks from
time series data, an approach based on formal met-
hods. Methods, 69(3):298–305. cited By 10.
Chatterjee, R., Doerfler, P., Orgad, H., Havron, S., Palmer,
J., Freed, D., Levy, K., Dell, N., McCoy, D., and Ris-
tenpart, T. (2018). The spyware used in intimate part-
ner violence. In 2018 IEEE Symposium on Security
and Privacy (SP), pages 441–458. IEEE.
Chen, S., Xue, M., Tang, Z., Xu, L., and Zhu, H.
(2016). Stormdroid: A streaminglized machine
learning-based system for detecting android malware.
In Proceedings of the 11th ACM on Asia Conference
on Computer and Communications Security, pages
377–388. ACM.
Cimitile, A., Mercaldo, F., Martinelli, F., Nardone, V., San-
tone, A., and Vaglini, G. (2017). Model checking for
ForSE 2019 - 3rd International Workshop on FORmal methods for Security Engineering
698