期刊文献+

基于多类特征的Android应用重打包检测方法 被引量:1

A Repackaging Detection Method of Android Applications Based on Multiple Features
下载PDF
导出
摘要 针对Android系统的应用重打包安全威胁,提出一种基于多类特征的Android应用重打包检测方法,结合简化的图特征向量检测算法与图片相似度算法,在保证应用相似度计算准确率的基础上提高计算效率。通过原型系统的实验,表明该系统能抵抗多种代码混淆带来的影响,准确地识别重打包应用程序,同时在运算效率上优于原重打包检测方案。 According to the security threats from Android repackage application, proposes a repackaging detection method of android applications based on multiple features, which combines the graph eigenvector algorithm for code detection and perceptual hash algorithm for image detection. This method improves the calculation efficiency on the basis of ensuring the similarity calculation accuracy. The experiment result of the prototype system indicates that this method can withstand the effects of a variety of code confusion, accurately identify the repackaged Android application. The similarity detection computation efficiency is better than the original method using Graph Eigenvector.
作者 邹慕蓉 胡勇 ZOU Mu-rong HU Yong(College of Electonics and Information Engineering, Sichuan University, Chengdu 610064)
出处 《现代计算机》 2017年第5期50-54,共5页 Modern Computer
关键词 ANDROID应用 重打包 图特征向量 感知哈希 抗混淆 Android Application Repackage Graph Eigenvector Perceptual Hash Anti Obsfucation
  • 相关文献

参考文献1

二级参考文献17

  • 1360公司.2014年Q2移动互联网App分发行业报告[EB/OL].[2015-03-01].http:∥dev.360.cn/da/hybgq2.html.
  • 2360公司.2014年中国手机安全状况报告[EB/OL].2015-03-01.http://ad8n468m37,17,yunpan.cn/1k/cyCT3CtHPnlTT.
  • 3Mahmood Y, Sarwar S, Pervez Z, et al. Method based static software birthmarks: a new approach to derogate software piracy[C-]//Proc of 2nd Interna- tional Conference on Computer, Control and Commu- nication. Karachi: IEEE, 2009: 149~155.
  • 4Lu B~ Liu F, Ge X, et al. Feature n-gram set based software zero-watermarking[C]//Proc of Internation- al Symposiums on Information Processing. Moscow: IEEE, 2008: 607-611.
  • 5Zhou W, Zhou Y, Jiang X, et al. Detecting repack- aged smartphone applications in third-party android marketplaces[C]//Proc of 2nd ACM Conf on Data and Application Security and Privacy. New York: ACM, 2012: 317-326.
  • 6Li S. Juxtapp and DStruct~ detectiong of similarity among Android applications~EB/OL~. ~2015-01-20~. http ://www. xiph. org/ogg/.
  • 7Brandes U. A faster algorithm for betweenness cen tralityFJ~. Journal of Mathematical Sociology, 2001, 25(2) : 163-177.
  • 8Blondel V D, Guillaume J I., Lamhiotte R, et al. Fast unfolding of communities in large networks[J]. Jour- nal of Statistical Mechanics~ Theory and Experiment, 2008(10) : 10008-10020.
  • 9Hall M, Frank E, Holmes G, et al. The WEKA da- ta mining software: an update[J]. ACM SIGKDD Explorations Newsletter, 2009, 11(1).. 10-18.
  • 10Gephi. Gephi toolkit E EB/OL~. ~ 2015-03-01 ]. h~tp://gephi, github, io/tooIkit/.

共引文献2

同被引文献15

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部