Exploiting Model Checking for Mobile Botnet Detection

Procedia Computer Science - Tập 159 - Trang 963-972 - 2019
Cinzia Bernardeschi1, Francesco Mercaldo2,3, Vittoria Nardone4, Antonella Santone3
1Department of Information Engineering, University of Pisa, Pisa, Italy
2Institute for Informatics and Telematics, National Research Council of Italy (CNR), Pisa, Italy
3Department of Bioscience and Territory, University of Molise, Pesche (IS), Italy
4Department of Engineering, University of Sannio, Benevento, Italy

Tài liệu tham khảo

Andersen, 2015, 573 Avvenuti, M., Bernardeschi, C., De Francesco, N., Masci, P., 2012. JCSI: A tool for checking secure information flow in java card applications. Journal of Systems and Software 85, 2479–2493. URL: https://doi.org/10.1016/j.jss.2012.05.061, doi:10.1016/j.jss.2012.05.061. Canfora, G., Martinelli, F., Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A., 2018. Leila: formal tool for identifying mobile malicious behaviour. IEEE Transactions on Software Engineering. Choi, 2013, 142 Cimitile, 2017, 263 Cimitile, 2018, Talos: no more ransomware victims with formal methods, International Journal of Information Security, 17, 719, 10.1007/s10207-017-0398-5 Clarke, 1986, Automatic verification of finite-state concurrent systems using temporal logic specifications, ACM Transactions on proramming Languages and Systems, 8, 244, 10.1145/5397.5399 Clarke, 2001 Faruki, 2015, Android security: a survey of issues, malware penetration, and defenses, IEEE communications surveys & tutorials, 17, 998, 10.1109/COMST.2014.2386139 Jadhav, 2015, 347 Kadir, 2015, 78 Karim, 2014, Botnet detection techniques: review, future trends, and issues, Journal of Zhejiang University SCIENCE C, 15, 943, 10.1631/jzus.C1300242 Letteri, I., Del Rosso, M., Caianiello, P., Cassioli, D., 2018. Performance of botnet detection by neural networks in software-defined networks, in: CEUR WORKSHOP PROCEEDINGS, CEUR-WS. Martinelli, 2018, Evaluating model checking for cyber threats code obfuscation identification, Journal of Parallel and Distributed Computing, 119, 203, 10.1016/j.jpdc.2018.04.008 Martinelli, 2017, 899 Mercaldo, 2016, 22 Mercaldo, 2016, 744 Milner, 1989 Pieterse, 2012, 1 Stirling, 1989, 2 Tansettanakorn, 2016, 1 Zhang, Y., Zheng, J., Ma, M., 2008. Handbook of research on wireless security. Zhou, Y., Jiang, X., 2012. Dissecting android malware: Characterization and evolution, in: Proceedings of 33rd IEEE Symposium on Security and Privacy (Oakland 2012).