作者: Rahul Potharaju , Andrew Newell , Cristina Nita-Rotaru , Xiangyu Zhang
DOI: 10.1007/978-3-642-28166-2_11
关键词:
摘要: In this paper, we show how an attacker can launch malware onto a large number of smartphone users by plagiarizing Android applications and using elements social engineering to increase infection rate. Our analysis dataset 158,000 meta-information indicates that 29.4% the are more likely be plagiarized. We propose three detection schemes rely on syntactic fingerprinting detect plagiarized under different levels obfuscation used attacker. 7,600 application binaries shows our all instances plagiarism from set real-world incidents with 0.5% false positives scale millions only commodity servers.