2019 4th International Conference on Information Systems and Computer Networks (ISCON) 2019
DOI: 10.1109/iscon47742.2019.9036319
|View full text |Cite
|
Sign up to set email alerts
|

Banking Trojans APK Detection using Formal Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Another widespread security threat in banking is malware. In this area the authors of [155] analysed Android banking applications using Krakatau byte-code tool 6 to generate the Java byte-code of the application, further translating it to Calculus of Communicating Systems (CCS) [183]. The authors then dispatched the CCS model to the Concurrency Workbench of New Century (CWB-NC) model checker [72] searching for malware properties.…”
Section: Financialmentioning
confidence: 99%
See 3 more Smart Citations
“…Another widespread security threat in banking is malware. In this area the authors of [155] analysed Android banking applications using Krakatau byte-code tool 6 to generate the Java byte-code of the application, further translating it to Calculus of Communicating Systems (CCS) [183]. The authors then dispatched the CCS model to the Concurrency Workbench of New Century (CWB-NC) model checker [72] searching for malware properties.…”
Section: Financialmentioning
confidence: 99%
“…Specification languages. AADL (Architecture Analysis & Design Language) [18,73], ASF (Anonymous Secure Framework) [156], ASLan++ (AVANTSSAR Specification Language) [21], BAN logic [54,232], Boogie [34], Boxed Ambients [138], CASM (ASM-based SL for compilers) [257], CCS (Calculus of Communicating Systems) [155], COVERT (compositional analysis of Android apps) [29], CSP (Communicating Sequential Systems) [123], CSP# (shared variables CSP) [241], CTL (Computation tree temporal logic) [233], Cloud Calculus [138], Cryptol [92], Dynamic State Machine [189], ERC20 token contracts [203], Event-B [85], HLPSL (High Level Protocol Specification Language) [46], Hoare logic [111], LS2 (Logic of Secure Systems) [30], LTL (linear-time temporal logic) [271], Markov Decision Process [184], Petri nets [15], π -calculus [43], PlusCal [9], Promela [175], RTL (real-time logic) [113], SPDL (Security Protocol Description Language) [171], SysML-Sec [18], TLA+ (Temporal Logic of Actions) [75], Trusted CSP# [30], überSpark [257], VDM [101], Verilog [167], VHDL [114], VML [230], vTRUST [120], XMHF (eXtensible and Modular Hypervisor Framework)…”
Section: Specification Languages and Associated Toolsmentioning
confidence: 99%
See 2 more Smart Citations