Abstract | ||
---|---|---|
Mobile phones are more and more used for sensitive resources exchange and access, becoming target for possible malware attacks. These attacks are still increasing with the birth of new and sophisticated malware that make the existing malware detection approaches often inadequate. Since the majority of new malware are generated using existing malicious code, it becomes very important tracking the mobile malware phylogeny. In this work, a Process Mining (PM) approach for building a malware phylogeny model using information contained in system calls traces, is proposed. The adoption of a declarative Process Mining technique allows to mine a constraint-based model that can be effectively used as a malware fingerprint expressing relationships and recurring execution patterns among system calls in the execution flows. The model characterizes the behavior of malware applications allowing the identification of similarities across malware families and among malware variants belonging to the same family. The proposed approach is evaluated using a dataset of more than 700 infected applications across seven malware families obtaining very encouraging results. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1109/CANDAR.2016.111 | 2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR) |
Keywords | Field | DocType |
Process Mining, Linear Temporal Logic, Declare, Malware Evolution, Malware Phylogeny, Security | Mobile malware,Cryptovirology,Web threat,Computer security,Computer science,Server,Asprox botnet,Malware,Cyber-collection,Process mining | Conference |
ISSN | Citations | PageRank |
2379-1888 | 0 | 0.34 |
References | Authors | |
0 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mario Luca Bernardi | 1 | 156 | 29.89 |
Marta Cimitile | 2 | 183 | 24.34 |
Francesco Mercaldo | 3 | 319 | 50.25 |