Utilising K Semantics for Collusion Detection in Android Applications

I.M. Asǎvoae, Hoang Nga Nguyen, M. Roggenbach, Siraj A. Shaikh

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    5 Citations (Scopus)

    Abstract

    The Android OS supports multiple communication methods between apps. This opens the possibility to carry out threats in a collaborative fashion, c.f. the Soundcomber example from 2011. In this paper we demonstrate an effective attempt to detect collusion via model-checking a set of apps utilising the KK framework.
    Original languageEnglish
    Title of host publicationCritical Systems: Formal Methods and Automated Verification
    EditorsMaurice H. Ter Beek, Stefania Gnesi, Alexander Knapp
    PublisherSpringer Verlag
    Pages142-149
    Volume9933 LNCS
    ISBN (Print)978-3-319-45942-4
    DOIs
    Publication statusPublished - Sept 2016
    EventJoint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems - Pisa, Italy
    Duration: 26 Sept 201628 Sept 2016

    Conference

    ConferenceJoint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems
    Abbreviated titleFMICS-AVoCS 2016
    Country/TerritoryItaly
    CityPisa
    Period26/09/1628/09/16

    Bibliographical note

    This book chapter/conference paper is not available on the repository. The paper was given at the Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016

    Keywords

    • Logics and Meanings of Programs
    • Programming Languages
    • Compilers
    • Interpreters
    • Software Engineering
    • Special Purpose and Application-Based Systems
    • Mathematical Logic and Formal Languages

    Fingerprint

    Dive into the research topics of 'Utilising K Semantics for Collusion Detection in Android Applications'. Together they form a unique fingerprint.

    Cite this