期刊文献+

SPRD:基于应用UI和程序依赖图的Android重打包应用快速检测方法 被引量:5

SPRD: fast application repackaging detection approach in Android based on application's UI and program dependency graph
下载PDF
导出
摘要 研究发现重打包应用通常不修改应用用户交互界面(UI,user interface)的结构,提出一种基于应用UI和程序代码的两阶段检测方法。首先,设计了一种基于UI抽象表示的散列快速相似性检测方法,识别UI相似的可疑重打包应用;然后,使用程序依赖图作为应用特征表示,实现细粒度、精准的代码克隆检测。基于所提方法实现了一种原型系统——SPRD(scalable and precise repacking detection),实验验证所提方法具有良好的可扩展性和准确性,可以有效地应用于百万级应用和亿万级代码的大规模应用市场。 A two stage detection approach which combine application’s UI and program code based on the observation that repackaging applications merely modify the structure of their user interface was proposed.Firstly,a fast hash similarity detection technique based on an abstracted representation of UI to identify the potential visual-similar repackaging applications was designed.Secondly,program dependency graph is used to represent as the feature of app to achieve fine-grained and precise code clone detection.A prototype system,SPRD,was implemented based on the proposed approach.Experimental results show that the proposed approach achieves a good performance in both scalability and accuracy,and can be effectively applied in millions of applications and billions of code detection.
作者 汪润 王丽娜 唐奔宵 赵磊 WANG Run;WANG Li’na;TANG Benxiao;ZHAO Lei(Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan University, Wuhan 430072, China;School of Computer, Wuhan University, Wuhan 430072, China;School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China)
出处 《通信学报》 EI CSCD 北大核心 2018年第3期159-171,共13页 Journal on Communications
基金 国家自然科学基金资助项目(No.U1536204 No.61672394 No.61373169 No.61672393) 国家高技术研究发展计划("863"计划)基金资助项目(No.2015AA016004)~~
关键词 重打包 代码克隆 用户界面 程序依赖图 安全与隐私 repackaging code clone user interface program dependency graph security and privacy
  • 相关文献

参考文献11

二级参考文献403

  • 1傅建明,李鹏伟,易乔,黄诗勇.Android组件间通信的安全缺陷静态检测方法[J].华中科技大学学报(自然科学版),2013,41(S2):259-264. 被引量:9
  • 2杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 3Gartner. Worldwide smartphone sales in Q3 2013 [EB/OL]. [ 2014- 01-08 ]. http://www, gartner, com/newsroom/id/ 2623415.
  • 4AppBrian Stats. Number of available Android applications [EB/OL]. [2014-01-08]. http://www, appbrain, com/stats/.
  • 5Consumer Reports. Keep your phone safe-How to protect yourself from wireless threat [EB/OL].[ 2014-01-08 ]. http ://www. eonsumerreports, org/ero/net0613, htm # info.
  • 6TrustGo. BSides Las Vegas: Your droid has no clothes [EB/OL]. [2014-01-08]. http://blog, trustlook, corn/.
  • 7National Vulnerability Database. Vulnerability summary for eVE 2012-0056 [EB/OL]. [2013-12-09]. http..//web, nvd. nist. gov[view]vulnldetail?vulnId=CVE-2012-OO56&cid= 2.
  • 8Nakamura Y, Sameshima Y. SELinux for electronics devices [C]//Proe of Linux Symp. Ottawa:Linux Symp Inc, 2008: 125-133.
  • 9Bugiel S, Davi L, Dmitrienko A, et al. Practical and lightweight domain isolation on android [C] //Proc of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. New York: ACM, 2011:51-62.
  • 10Smalley S, Craig R. Security enhanced (SE) Android: bringing flexible MAC to Android [C/OL] //Proc of the 20th Annual Network and Distributed System Security Syrup. 2013 [2014-03-20]. http://www, internetsociety, org/events/ ndss-symposium- 2013 / papers-and- pr esentations.

共引文献326

同被引文献48

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部