5 research outputs found

    Analyzing and Detecting Malicious Activities in Emerging Communication Platforms

    Get PDF
    Benefiting from innovatory techniques, two communication platforms (online social networking (OSN) platforms and smartphone platforms) have emerged and been widely used in the last few years. However, cybercriminals have also utilized these two emerging platforms to launch malicious activities such as sending spam, spreading malware, hosting botnet command and control (C&C) channels, and performing other illicit activities. All these malicious activities may cause significant economic loss to our society and even threaten national security. Thus, great efforts are indeed needed to mitigate malicious activities on these advanced communication platforms. The goal of this research is to make a deep analysis of malicious activities on OSN and smartphone platforms, and to develop effective and efficient defense approaches against those malicious activities. Firstly, this dissertation performs an empirical analysis of the cyber criminal ecosystem on a large-scale online social networking website space. Secondly, through reverse engineering OSN spammers’ tastes (their preferred targets to spam), this dissertation provides guidelines for building more effective social honeypots on the online social networking platforms, and generates new insights to defend against OSN spammers. Thirdly, this dissertation shows a comprehensive empirical study on analyzing the market-level and network-level behaviors of the Android malware ecosystem. Lastly, by grouping the common program logic among malware families, this dissertation designs an effective system to automatically detect Android malware

    Trustworthiness in Mobile Cyber Physical Systems

    Get PDF
    Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS

    Renforcement formel et automatique de politiques de sécurité dans des applications Android par réécriture

    Get PDF
    Autant les applications Android ont rĂ©ussi Ă  positionner Android parmi les systĂšmes d'exploitation les plus utilisĂ©s, autant elles ont facilitĂ© aux crĂ©ateurs de maliciels de s'introduire et de compromettre ses appareils. Une longue liste de menaces causĂ©es par les applications tĂ©lĂ©chargĂ©es vise l'intĂ©gritĂ© du systĂšme et la vie privĂ©e de ses utilisateurs. MalgrĂ© l'Ă©volution incessante du systĂšme Android pour amĂ©liorer son mĂ©canisme de sĂ©curitĂ©, le niveau de sophistication des logiciels malveillants a augmentĂ© et s'adapte continuellement avec les nouvelles mesures. L'une des principales faiblesses menaçant la sĂ©curitĂ© de ce systĂšme est le manque abyssal d'outils et d'environnements permettant la spĂ©cification et la vĂ©rification formelle des comportements des applications avant que les dommages ne soient causĂ©s. À cet Ă©gard, les mĂ©thodes formelles semblent ĂȘtre le moyen le plus naturel et le plus sĂ»r pour une spĂ©cification et une vĂ©rification rigoureuses et non ambiguĂ«s de telles applications. Notre objectif principal est de dĂ©velopper un cadre formel pour le renforcement de politiques de sĂ©curitĂ© dans les applications Android. L'idĂ©e est d'Ă©tablir une synergie entre le paradigme orientĂ© aspect et les mĂ©thodes formelles. L'approche consiste Ă  rĂ©Ă©crire le programme de l'application en ajoutant des tests de sĂ©curitĂ© Ă  certains points soigneusement sĂ©lectionnĂ©s pour garantir le respect de la politique de sĂ©curitĂ©. La version rĂ©Ă©crite du programme prĂ©serve tous les bons comportements de la version originale qui sont conformes Ă  la politique de sĂ©curitĂ© et agit contre les mauvais.As much as they have positioned Android among the most widely used operating systems, Android applications have helped malware creators to break in and infect its devices. A long list of threats caused by downloaded applications targets the integrity of the system and the privacy of its users. While the Android system is constantly evolving to improve its security mechanism, the malware's sophistication level is skyrocketing and continuously adapting with the new measures. One of the main weaknesses threatening smartphone security is the abysmal lack of tools and environments that allow formal specification and verification of application behaviors before damage is done. In this regard, formal methods seem to be the most natural and secure way for rigorous and unambiguous specification and verification of such applications. Our ultimate goal is to formally enforce security policies on Android applications. The main idea is to establish a synergy between the aspect-oriented paradigm and formal methods such as the program rewriting technique. The approach consists of rewriting the application program by adding security tests at certain carefully selected points to ensure that the security policy is respected. The rewritten version of the program preserves all the good behaviors of the original one that comply with the security policy and acts against the bad ones

    Modular Collaborative Program Analysis

    Get PDF
    With our world increasingly relying on computers, it is important to ensure the quality, correctness, security, and performance of software systems. Static analysis that computes properties of computer programs without executing them has been an important method to achieve this for decades. However, static analysis faces major chal- lenges in increasingly complex programming languages and software systems and increasing and sometimes conflicting demands for soundness, precision, and scalability. In order to cope with these challenges, it is necessary to build static analyses for complex problems from small, independent, yet collaborating modules that can be developed in isolation and combined in a plug-and-play manner. So far, no generic architecture to implement and combine a broad range of dissimilar static analyses exists. The goal of this thesis is thus to design such an architecture and implement it as a generic framework for developing modular, collaborative static analyses. We use several, diverse case-study analyses from which we systematically derive requirements to guide the design of the framework. Based on this, we propose the use of a blackboard-architecture style collaboration of analyses that we implement in the OPAL framework. We also develop a formal model of our architectures core concepts and show how it enables freely composing analyses while retaining their soundness guarantees. We showcase and evaluate our architecture using the case-study analyses, each of which shows how important and complex problems of static analysis can be addressed using a modular, collaborative implementation style. In particular, we show how a modular architecture for the construction of call graphs ensures consistent soundness of different algorithms. We show how modular analyses for different aspects of immutability mutually benefit each other. Finally, we show how the analysis of method purity can benefit from the use of other complex analyses in a collaborative manner and from exchanging different analysis implementations that exhibit different characteristics. Each of these case studies improves over the respective state of the art in terms of soundness, precision, and/or scalability and shows how our architecture enables experimenting with and fine-tuning trade-offs between these qualities
    corecore