Analysis of content copyright infringement in mobile application markets

作者: Ryan Johnson , Nikolaos Kiourtis , Angelos Stavrou , Vincent Sritapan

DOI: 10.1109/ECRIME.2015.7120798

关键词: Mobile databaseMobile computingEngineeringMobile WebMobile paymentMobile deep linkingInternet privacyMobile searchAndroid (operating system)Mobile technologyWorld Wide Web

摘要: As mobile devices increasingly become bigger in terms of display and reliable delivering paid entertainment video content, we also see a rise the presence applications that attempt to profit by streaming pirated content unsuspected end-users. These are both free case applications, source funding appears be advertisements displayed while is streamed device. In this paper, assess extent copyright infringement for markets span multiple platforms (iOS, Android, Windows Mobile) cover official unofficial located across world. Using set search keywords point titles discovered 8,592 5,550 iOS, 3,910 matched our criteria. Out those hundreds had links either locally or remotely stored were not developed, endorsed, or, many cases, known owners copyrighted contents. We revealed network locations 856,717 Uniform Resource Locators (URLs) pointing back-end servers cyber-lockers used communicate application.

参考文章(14)
Koushik Sen, Gul Agha, CUTE and jCUTE: Concolic Unit Testing and Explicit Path Model-Checking Tools Computer Aided Verification. pp. 419- 423 ,(2006) , 10.1007/11817963_38
Zhendong Su, Dongyan Xu, Zhiqiang Lin, Zhui Deng, Xiangyu Zhang, Fei Peng, X-force: force-executing binary programs for security applications usenix security symposium. pp. 829- 844 ,(2014)
Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee, Understanding the prevalence and use of alternative plans in malware with network games annual computer security applications conference. pp. 1- 10 ,(2011) , 10.1145/2076732.2076734
Mykola Protsenko, Tilo Muller, PANDORA applies non-deterministic obfuscation randomly to Android international conference on malicious and unwanted software. pp. 59- 67 ,(2013) , 10.1109/MALWARE.2013.6703686
R. Johnson, Zhaohui Wang, A. Stavrou, J. Voas, Exposing software security and availability risks for commercial mobile devices reliability and maintainability symposium. pp. 1- 7 ,(2013) , 10.1109/RAMS.2013.6517735
Pranav Garg, Franjo Ivančić, Gogul Balakrishnan, Naoto Maeda, Aarti Gupta, None, Feedback-directed unit test generation for C/C++ using concolic execution international conference on software engineering. pp. 132- 141 ,(2013) , 10.5555/2486788.2486807
Mario Linares-Vásquez, Andrew Holtzhauer, Carlos Bernal-Cárdenas, Denys Poshyvanyk, Revisiting Android reuse studies in the context of code obfuscation and library usages Proceedings of the 11th Working Conference on Mining Software Repositories - MSR 2014. pp. 242- 251 ,(2014) , 10.1145/2597073.2597109
Ryan Johnson, Angelos Stavrou, Forced-Path Execution for Android Applications on x86 Platforms ieee international conference on software security and reliability companion. pp. 188- 197 ,(2013) , 10.1109/SERE-C.2013.36
Mariano Graziano, Corrado Leita, Davide Balzarotti, Towards network containment in malware analysis systems Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12. pp. 339- 348 ,(2012) , 10.1145/2420950.2421000
Rupak Majumdar, Koushik Sen, Hybrid Concolic Testing international conference on software engineering. pp. 416- 426 ,(2007) , 10.1109/ICSE.2007.41