ICSME 2025
Sun 7 - Fri 12 September 2025 Auckland, New Zealand
Fri 12 Sep 2025 14:25 - 14:35 at Case Room 2 260-057 - Session 16 - Security 2 Chair(s): Gregorio Robles

The rapid evolution of Android malware poses significant challenges to the maintenance and security of mobile applications (apps). Traditional detection techniques often struggle to keep pace with emerging malware variants that employ advanced tactics such as code obfuscation and dynamic behavior triggering. One major limitation of these approaches is their inability to localize malicious payloads at a fine-grained level, hindering precise understanding of malicious behavior. This gap in understanding makes the design of effective and targeted mitigation strategies difficult, leaving mobile apps vulnerable to continuously evolving threats.

To address this gap, we propose MalLoc, a novel approach that leverages the code understanding capabilities of large language models (LLMs) to localize malicious payloads at a fine-grained level within Android malware. Our experimental results demonstrate the feasibility and effectiveness of using LLMs for this task, highlighting the potential of MalLoc to enhance precision and interpretability in malware analysis. This work advances beyond traditional detection and classification by enabling deeper insights into behavior-level malicious logic and opens new directions for research, including dynamic modeling of localized threats and targeted countermeasure development.

Fri 12 Sep

Displayed time zone: Auckland, Wellington change

13:30 - 15:00
Session 16 - Security 2Research Papers Track / Industry Track / Registered Reports / NIER Track at Case Room 2 260-057
Chair(s): Gregorio Robles Universidad Rey Juan Carlos
13:30
15m
Understanding the Faults in Serverless Computing Based Applications: An Empirical Study
Research Papers Track
Changrong Xie National University of Defense Technology, Yang Zhang National University of Defense Technology, China, Xinjun Mao National University of Defense Technology, Kang Yang National University of Defense Technology, Tanghaoran Zhang National University of Defense Technology
13:45
15m
Security Vulnerabilities in Docker Images: A Cross-Tag Study of Application Dependencies
Research Papers Track
Hamid Mohayeji Nasrabadi Eindhoven University of Technology, Eleni Constantinou University of Cyprus, Alexander Serebrenik Eindhoven University of Technology
14:00
15m
Trust and Verify: Formally Verified and Upgradable Trusted Functions
Research Papers Track
Marcus Birgersson KTH Royal Institute of Technology, Cyrille Artho KTH Royal Institute of Technology, Sweden, Musard Balliu KTH Royal Institute of Technology
14:25
10m
MalLoc: Towards Fine-grained Android Malicious Payload Localization via LLMs
NIER Track
Tiezhu Sun University of Luxembourg, Marco Alecci University of Luxembourg, Aleksandr Pilgun University of Luxembourg, Yewei Song University of Luxembourg, Xunzhu Tang University of Luxembourg, Jordan Samhi University of Luxembourg, Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg
Pre-print
14:35
15m
Levels of Binary Equivalence for the Comparison of Binaries from Alternative Builds
Industry Track
Jens Dietrich Victoria University of Wellington, Tim White Victoria University of Wellington, Behnaz Hassanshahi Oracle Labs, Australia, Paddy Krishnan Oracle Labs, Australia
14:50
10m
Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs
Registered Reports
Maria Camporese University of Trento, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam