LibD: scalable and precise third-party library detection in android markets

作者: Menghao Li , Wei Wang , Pei Wang , Shuai Wang , Dinghao Wu

DOI: 10.1109/ICSE.2017.38

关键词: Android (operating system)Computer securityThird partyMalware analysisSoftware miningLocation-based serviceScalabilityObfuscationEngineeringFeature hashing

摘要: With the thriving of mobile app markets, third-party libraries are pervasively integrated in Android applications. Third-party provide functionality such as advertisements, location services, and social networking making multi-functional development much more productive. However, spread vulnerable or harmful may also hurt entire ecosystem, leading to various security problems. The platform suffers severely from problems due way its ecosystem is constructed maintained. Therefore, library identification has emerged an important problem which basis many applications repackaging detection malware analysis. According our investigation, existing work on still requires improvement aspects, including accuracy obfuscation resilience. In response these limitations, we propose a novel approach identifying libraries. Our method utilizes internal code dependencies detect classify candidates. Different most previous methods detected candidates based similarity comparison, feature hashing can better handle whose package names obfuscated. Based this approach, have developed prototypical tool called LibD evaluated it with update-to-date large-scale dataset. experimental results 1,427,395 apps show that compared tools, multi-package presence name-based obfuscation, significantly improved precision without loss scalability.

参考文章(30)
Jonathan Crussell, Clint Gibler, Hao Chen, AnDarwin: Scalable Detection of Semantically Similar Android Applications european symposium on research in computer security. pp. 182- 199 ,(2013) , 10.1007/978-3-642-40203-6_11
Jonathan Crussell, Clint Gibler, Hao Chen, Attack of the Clones: Detecting Cloned Applications on Android Markets Computer Security – ESORICS 2012. pp. 37- 54 ,(2012) , 10.1007/978-3-642-33167-1_3
Norman M. Sadeh, Jialiu Lin, Jason I. Hong, Bin Liu, Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings symposium on usable privacy and security. pp. 199- 212 ,(2014)
Adam Pridgen, Dan S. Wallach, Theodore Book, Longitudinal Analysis of Android Ad Library Permissions arXiv: Cryptography and Security. ,(2013)
Suvda Myagmar, Shan Lu, Zhenmin Li, Yuanyuan Zhou, CP-Miner: a tool for finding copy-paste and related bugs in operating system code operating systems design and implementation. pp. 20- 20 ,(2004)
Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, Dawn Song, Juxtapp: a scalable system for detecting code reuse among android applications international conference on detection of intrusions and malware and vulnerability assessment. pp. 62- 81 ,(2012) , 10.1007/978-3-642-37300-8_4
Raghavan Komondoor, Susan Horwitz, Using Slicing to Identify Duplication in Source Code static analysis symposium. pp. 40- 56 ,(2001) , 10.1007/3-540-47764-0_3
Christian Rossow, Thorsten Holz, Jannik Pewny, Behrad Garmany, Robert Gawlik, Cross-Architecture Bug Search in Binary Executables 2015 IEEE Symposium on Security and Privacy. pp. 709- 724 ,(2015) , 10.1109/SP.2015.49
Bin Liu, Bin Liu, Hongxia Jin, Ramesh Govindan, Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps international conference on mobile systems, applications, and services. pp. 89- 103 ,(2015) , 10.1145/2742647.2742668
Haoyu Wang, Yao Guo, Ziang Ma, Xiangqun Chen, WuKong: a scalable and accurate two-phase approach to Android app clone detection international symposium on software testing and analysis. pp. 71- 82 ,(2015) , 10.1145/2771783.2771795