Download malware? no, thanks: how formal methods can block update attacks

F Mercaldo, V Nardone, A Santone… - Proceedings of the 4th …, 2016 - dl.acm.org
In mobile malware landscape there are many techniques to inject malicious payload in a
trusted application: one of the most common is represented by the so-called update attack …

Evaluating model checking for cyber threats code obfuscation identification

F Martinelli, F Mercaldo, V Nardone, A Santone… - Journal of Parallel and …, 2018 - Elsevier
Code obfuscation is a set of transformations that make code programs harder to understand.
The goal of code obfuscation is to make reverse engineering of programs infeasible, while …

Efficient type inference for secure information flow

K Hristova, T Rothamel, YA Liu, SD Stoller - Proceedings of the 2006 …, 2006 - dl.acm.org
This paper describes the design, analysis, and implementation of an efficient algorithm for
information flow analysis expressed using a type system. Given a program and an …

Secure information flow by model checking pushdown system

C Sun, L Tang, Z Chen - 2009 Symposia and Workshops on …, 2009 - ieeexplore.ieee.org
We propose an approach on model checking information flow for imperative language with
procedures. We characterize our model with pushdown system, which has a stack of …

Probabilistic model checking applied to autonomous spacecraft reconfiguration

V Nardone, A Santone, M Tipaldi… - 2016 IEEE Metrology …, 2016 - ieeexplore.ieee.org
Formal verification techniques are necessary to demonstrate the completeness, the
correctness, and the consistency in implementing spacecraft model-based autonomy …

Application of equivalence checking in a loan origination process in banking industry

A Santone, V Intilangelo… - 2013 Workshops on …, 2013 - ieeexplore.ieee.org
Equivalence checking is traditionally applied to computer system design. It is a promising
formal technique for the improvement of software quality. However, it requires detailed …

Download malware? No, thanks

F Mercaldo, V Nardone, A Santone… - Proceedings of the …, 2016 - pdfs.semanticscholar.org
AnserverBot✓ AnserverBot malicious behavior is embedded into the host app at installation
time, ie, the malicious payload is not downloaded from a remote location but it is stored in an …

Efficient formal verification in banking processes

A Santone, V Intilangelo… - 2013 IEEE Ninth World …, 2013 - ieeexplore.ieee.org
Model checking is a very useful method to verify concurrent and distributed systems which is
traditionally applied to computer system design. We examine the applicability of model …

[PDF][PDF] Identifying Insecure Features in Android Applications using Model Checking.

F Martinelli, F Mercaldo, V Nardone - ICISSP, 2018 - scitepress.org
Nowadays Android is the most widespread operating system. This is the reason why
malware writers target it. Both researchers and commercial antimalware provide several …

Instruction-level security ty** by abstract interpretation

N De Francesco, L Martini - International Journal of Information Security, 2007 - Springer
We present a method based on abstract interpretation to check secure information flow in
programs with dynamic structures where input and output channels are associated with …