Attack of the Clones: Detecting Cloned Applications on Android Markets

作者: Jonathan Crussell , Clint Gibler , Hao Chen

DOI: 10.1007/978-3-642-33167-1_3

关键词: Behavioral similarityCopyingMachine codeAndroid applicationComputer securityComputer scienceFalse positive rateCloningMachine learningArtificial intelligenceAndroid (operating system)Malware

摘要: We present DNADroid, a tool that detects Android application copying, or “cloning”, by robustly computing the similarity between two applications. DNADroid achieves this comparing program dependency graphs methods in candidate Using we found at least 141 applications have been victims of cloning, some as many seven times. has very low false positive rate — manually confirmed all detected are indeed clones either visual behavioral similarity. several case studies give insight into why cloned, including localization and redirecting ad revenue. describe malware being added to an show how was able detect variants same malware. Lastly, offer examples open source cracking used wild.

参考文章(29)
Clifford A. Pickover, Computers and the imagination ,(1991)
Hans Meinhardt, Martin Klingler, Pattern formation by coupled oscillations: The pigmentation patterns on the shells of molluscs International symposium on mathematical topics in population biology, morphogenesis and neurosciences. pp. 184- 198 ,(1987) , 10.1007/978-3-642-93360-8_18
P Prusinkiewicz, D Streibel, Constraint-based modeling of three-dimensional shapes graphics interface. pp. 158- 163 ,(1986)
J Campbell, G Oster, B Ermentrout, A MODEL FOR SHELL PATTERNS BASED ON NEURAL ACTIVITY Veliger. ,vol. 28, pp. 369- 388 ,(1986)
C. Illert, Formulation and solution of the classical seashell problem Il Nuovo Cimento D. ,vol. 9, pp. 791- 814 ,(1987) , 10.1007/BF02453750
Ginger Myles, Christian Collberg, Detecting Software Theft via Whole Program Path Birthmarks international conference on information security. pp. 404- 415 ,(2004) , 10.1007/978-3-540-30144-8_34
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning, Detecting repackaged smartphone applications in third-party android marketplaces Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12. pp. 317- 326 ,(2012) , 10.1145/2133601.2133640
Peter E. Oppenheimer, Real time design and animation of fractal plants and trees ACM SIGGRAPH Computer Graphics. ,vol. 20, pp. 55- 64 ,(1986) , 10.1145/15886.15892