期刊文献+

On Identifying and Explaining Similarities in Android Apps

原文传递
导出
摘要 App updates and repackaging are recurrent in the Android ecosystem,filling markets with similar apps that must be identified.Despite the existence of several approaches to improving the scalability of detecting repackaged/cloned apps,researchers and practitioners are eventually faced with the need for a comprehensive pairwise comparison(or simultaneously multiple app comparisons)to understand and validate the similarities among apps.In this work,we present the design and implementation of our research-based prototype tool called SimiDroid for multi-level similarity comparison of Android apps.SimiDroid is built with the aim to support the comprehension of similarities/changes among app versions and among repackaged apps.In particular,we demonstrate the need and usefulness of such a framework based on different case studies implementing different dissection scenarios for revealing various insights on how repackaged apps are built.We further show that the similarity comparison plugins implemented in SimiDroid yield more accurate results than the state of the art.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2019年第2期437-455,共19页 计算机科学技术学报(英文版)
基金 the Luxembourg National Research Fund(FNR),Luxembourg,under Grant Nos.CHARACTERIZE C17/IS/11693861 and Recommend C15/IS/10449467 the National Natural Science Foundation of China under Grant No.61702045 the Beijing University of Posts and Telecommunications(BUPT)Youth Research and Innovation Program of China under Grant No.2017RC40.
  • 相关文献

参考文献2

二级参考文献30

  • 1Zhou Y, Jiang X. Dissecting Android malware: Character- ization and evolution. In Proe. the 2012 IEEE Symposium on Security and Privacy, May 2012, pp.95-109.
  • 2Zhou W, Zhou Y, Jiang X et al. Detecting repackaged smartphone applications in third-party Android market- places. In Proc. the 2nd CODASPY, Feb. 2012, pp.317-326.
  • 3Crussell J, Gibler C, Chert H. Attack of the clones: De- tecting cloned applications on Android markets. In Lecture Notes in Computer Science 7459, Foresti St Yung M, Mar- tinelli F (eds.), Springer, 2012, pp.37-54.
  • 4Bruschi D, Martignoni L, Monga M. Using code normaliza- tion for fighting self-mutating malware. In Proc. Int. Syrup. Secure Software Engineering, Mar. 2006.
  • 5Walenstein A, Lakhotia A. The software similarity prob- lem in malware analysis. In Proc. Dagstuhl Seminar 06301: Duplication, Redundancy, and Similarity in Software, July 2006.
  • 6Roy C, Cordy J, Koschke R. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Science of Computer Programming, 2009, 74(7): 470-495.
  • 7Cordy J R, Roy C K. The NiCad clone detector. In Proc. the 19th ICPC, June 2011, pp.219-220.
  • 8Griffin K, Schneider S, Hu X et al. Automatic generation of string signatures for malware detection. In Proc. the 12th RAID, Sept. 2009, pp.101-120.
  • 9Christodorescu M, Jha S, Seshia S Aet al. Semantics-aware malware detection. In Proc. the 2005 IEEE Symposium on Security and Privacy, May 2005, pp.32-46.
  • 10Hanna S, Huang L, Wu E et al. JuxtApp: A scalable system for detecting code reuse among Android applica- tions. In Lecture Notes in Computer Science 7591, Flegel U, Markatos E, Robertson W (eds.), Springer Berlin Hei- delberg, 2013, pp.62-81.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部