covert channels. Moreover, we will study techniques
aimed to detect this kind of communication.
As a matter of fact, we plan to apply formal meth-
ods for implementing an approach for identifying
these communications, so as to demonstrate how it
is possible to counter them. As a matter of fact, in
literature formal methods already demonstrated their
ability to detect malicious communication between
Android applications (Iadarola et al., 2020; Casolare
et al., 2020b).
ACKNOWLEDGEMENTS
This work has been partially supported by MIUR -
SecureOpenNets, EU SPARTA, CyberSANE and E-
CORRIDOR projects.
REFERENCES
Al-Haiqi, A., Ismail, M., and Nordin, R. (2014). A new
sensors-based covert channel on android. The Scien-
tific World Journal, 2014.
Canfora, G., Martinelli, F., Mercaldo, F., Nardone, V., San-
tone, A., and Visaggio, C. A. (2018). Leila: formal
tool for identifying mobile malicious behaviour. IEEE
Transactions on Software Engineering, 45(12):1230–
1252.
Casolare, R., Martinelli, F., Mercaldo, F., and Santone, A.
(2020a). Android collusion: Detecting malicious ap-
plications inter-communication through sharedprefer-
ences. Information, 11(6):304.
Casolare, R., Martinelli, F., Mercaldo, F., and Santone, A.
(2020b). Malicious collusion detection in mobile en-
vironment by means of model checking. In 2020
International Joint Conference on Neural Networks
(IJCNN), pages 1–6. IEEE.
Cimino, M. G., De Francesco, N., Mercaldo, F., San-
tone, A., and Vaglini, G. (2020). Model checking
for malicious family detection and phylogenetic anal-
ysis in mobile environment. Computers & Security,
90:101691.
Cimitile, A., Mercaldo, F., Nardone, V., Santone, A., and
Visaggio, C. A. (2018). Talos: no more ransomware
victims with formal methods. International Journal of
Information Security, 17(6):719–738.
Denney, K., Uluagac, A. S., Aksu, H., and Akkaya, K.
(2018). An android-based covert channel framework
on wearables using status bar notifications. In Versa-
tile Cybersecurity, pages 1–17. Springer.
Enck, W. (2011). Defending users against smartphone apps:
Techniques and future directions. In International
Conference on Information Systems Security, pages
49–70. Springer.
Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-
G., Cox, L. P., Jung, J., McDaniel, P., and Sheth,
A. N. (2014). Taintdroid: an information-flow track-
ing system for realtime privacy monitoring on smart-
phones. ACM Transactions on Computer Systems
(TOCS), 32(2):1–29.
Guri, M. (2020). Magneto: Covert channel between air-
gapped systems and nearby smartphones via cpu-
generated magnetic fields. Future Generation Com-
puter Systems.
Iadarola, G., Martinelli, F., Mercaldo, F., and Santone,
A. (2020). Call graph and model checking for fine-
grained android malicious behaviour detection. Ap-
plied Sciences, 10(22):7975.
Mahboubi, A., Camtepe, S., and Morarji, H. (2017). A
study on formal methods to generalize heterogeneous
mobile malware propagation and their impacts. IEEE
Access, 5:27740–27756.
Marforio, C., Ritzdorf, H., Francillon, A., and Capkun, S.
(2012). Analysis of the communication between col-
luding applications on modern smartphones. In Pro-
ceedings of the 28th Annual Computer Security Appli-
cations Conference, pages 51–60.
Mercaldo, F., Nardone, V., Santone, A., and Visaggio,
C. A. (2016a). Hey malware, i can find you! In
2016 IEEE 25th International Conference on En-
abling Technologies: Infrastructure for Collaborative
Enterprises (WETICE), pages 261–262. IEEE.
Mercaldo, F., Visaggio, C. A., Canfora, G., and Cimitile,
A. (2016b). Mobile malware detection in the real
world. In 2016 IEEE/ACM 38th International Confer-
ence on Software Engineering Companion (ICSE-C),
pages 744–746. IEEE.
Nguyen, T., Mcdonald, J., Glisson, W., and Andel, T.
(2020). Detecting repackaged android applications us-
ing perceptual hashing. In Proceedings of the 53rd
Hawaii International Conference on System Sciences.
Shrestha, P. L., Hempel, M., Rezaei, F., and Sharif, H.
(2015). A support vector machine-based frame-
work for detection of covert timing channels. IEEE
Transactions on Dependable and Secure Computing,
13(2):274–283.
Wang, W., Tian, D., Meng, W., Jia, X., Zhao, R., and
Ma, R. (2020). Msym: A multichannel communica-
tion system for android devices. Computer Networks,
168:107024.
ForSE 2021 - 5th International Workshop on FORmal methods for Security Engineering
818