Ransomware steals your phone. formal methods rescue it

F Mercaldo, V Nardone, A Santone… - … 2016, Held as Part of the …, 2016 - Springer
Ransomware is a recent type of malware which makes inaccessible the files or the device of
the victim. The only way to unlock the infected device or to have the keys for decrypting the …

Talos: no more ransomware victims with formal methods

A Cimitile, F Mercaldo, V Nardone, A Santone… - International Journal of …, 2018 - Springer
Ransomware is a very effective form of malware that is recently spreading out on an
impressive number of workstations and smartphones. This malware blocks the access to the …

Leila: formal tool for identifying mobile malicious behaviour

G Canfora, F Martinelli, F Mercaldo… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
With the increasing diffusion of mobile technologies, nowadays mobile devices represent an
irreplaceable tool to perform several operations, from posting a status on a social network to …

The role of model checking in software engineering

AK Karna, Y Chen, H Yu, H Zhong, J Zhao - Frontiers of Computer Science, 2018 - Springer
Abstract Model checking is a formal verification technique. It takes an exhaustively strategy
to check hardware circuits and network protocols against desired properties. Having been …

Ransomware inside out

F Mercaldo, V Nardone… - 2016 11th International …, 2016 - ieeexplore.ieee.org
Android is currently the most widely used mobile environment. This trend encourages
malware writers to develop specific attacks targeting this platform with threats designed to …

Malware forensics: Legacy solutions, recent advances, and future challenges

F Naït-Abdesselam, A Darwaish, C Titouna - Advances in Computing …, 2022 - Springer
Malware applications are continuing to grow across all computing and mobile platforms.
Since the last decade, every day, half a million malware applications emerge as a real threat …

[PDF][PDF] Identification of Android Malware Families with Model Checking.

P Battista, F Mercaldo, V Nardone, A Santone… - ICISSP, 2016 - scitepress.org
Android malware is increasing more and more in complexity. Current signature based
antimalware mechanisms are not able to detect zero-day attacks, also trivial code …

Download malware? no, thanks: how formal methods can block update attacks

F Mercaldo, V Nardone, A Santone… - Proceedings of the 4th …, 2016 - dl.acm.org
In mobile malware landscape there are many techniques to inject malicious payload in a
trusted application: one of the most common is represented by the so-called update attack …

Lessons learnt on reproducibility in machine learning based android malware detection

N Daoudi, K Allix, TF Bissyandé, J Klein - Empirical Software Engineering, 2021 - Springer
A well-known curse of computer security research is that it often produces systems that,
while technically sound, fail operationally. To overcome this curse, the community generally …

Formal methods meet mobile code obfuscation identification of code reordering technique

A Cimitile, F Martinelli, F Mercaldo… - 2017 IEEE 26th …, 2017 - ieeexplore.ieee.org
Android represents the most widespread mobile environment. This increasing diffusion is
the reason why attackers are attracted to develop malware targeting this platform. Malware …