A Framework for Evaluating Mobile App Repackaging Detection Algorithms

作者: Heqing Huang , Sencun Zhu , Peng Liu , Dinghao Wu

DOI: 10.1007/978-3-642-38908-5_13

关键词:

摘要: … can potentially cause false negatives, because they change the main … users can download applications from both official market … techniques can be easily adapted to mobile applications …

参考文章(14)
Jonathan Crussell, Clint Gibler, Hao Chen, Attack of the Clones: Detecting Cloned Applications on Android Markets Computer Security – ESORICS 2012. pp. 37- 54 ,(2012) , 10.1007/978-3-642-33167-1_3
Raja Vallee-Rai, Patrick Lam, Vijay Sundaresan, Laurie Hendren, Phong Co, Etienne M. Gagnon, Soot---a java optimization framework conference of the centre for advanced studies on collaborative research. ,(1999)
Ross Anderson, Hassen Saïdi, Rubin Xu, Aurasium: practical policy enforcement for Android applications usenix security symposium. pp. 27- 27 ,(2012)
Christian Collberg, Douglas Low, C. Thomborson, A Taxonomy of Obfuscating Transformations Department of Computer Science, The University of Auckland, New Zealand. ,(1997)
Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, Dawn Song, Juxtapp: a scalable system for detecting code reuse among android applications international conference on detection of intrusions and malware and vulnerability assessment. pp. 62- 81 ,(2012) , 10.1007/978-3-642-37300-8_4
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning, Detecting repackaged smartphone applications in third-party android marketplaces Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12. pp. 317- 326 ,(2012) , 10.1145/2133601.2133640
Damien Octeau, Somesh Jha, Patrick McDaniel, Retargeting Android applications to Java bytecode Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering - FSE '12. pp. 6- ,(2012) , 10.1145/2393596.2393600
Ilsun You, Kangbin Yim, Malware Obfuscation Techniques: A Brief Survey broadband and wireless computing, communication and applications. pp. 297- 300 ,(2010) , 10.1109/BWCCA.2010.85
C. Collberg, G.R. Myles, A. Huntwork, Sandmark-A tool for software protection research ieee symposium on security and privacy. ,vol. 1, pp. 40- 49 ,(2003) , 10.1109/MSECP.2003.1219058
Xinran Wang, Yoon-Chan Jhi, Sencun Zhu, Peng Liu, Detecting Software Theft via System Call Based Birthmarks annual computer security applications conference. pp. 149- 158 ,(2009) , 10.1109/ACSAC.2009.24