AndRadar: Fast Discovery of Android Applications in Alternative Markets

作者: Martina Lindorfer , Stamatis Volanis , Alessandro Sisto , Matthias Neugschwandtner , Elias Athanasopoulos

DOI: 10.1007/978-3-319-08509-8_4

关键词:

摘要: Compared to traditional desktop software, Android applications are delivered through software repositories, commonly known as application markets. Other mobile platforms, such Apple iOS and BlackBerry OS also use the marketplace model, but what is unique existence of a plethora alternative This complicates task detecting tracking malware. Identifying malicious in one particular market simply not enough, many instances this may exist other To quantify phenomenon, we exhaustively crawled 8 markets between June November 2013. Our findings indicate that host large number ad-aggressive apps, non-negligible amount malware, some even allow authors publish apps without prompt action.

参考文章(22)
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri, A study of android application security usenix security symposium. pp. 21- 21 ,(2011)
Jonathan Crussell, Clint Gibler, Hao Chen, Attack of the Clones: Detecting Cloned Applications on Android Markets Computer Security – ESORICS 2012. pp. 37- 54 ,(2012) , 10.1007/978-3-642-33167-1_3
Min Zheng, Patrick P. C. Lee, John C. S. Lui, ADAM: an automatic and extensible platform to stress test android anti-virus systems international conference on detection of intrusions and malware and vulnerability assessment. pp. 82- 101 ,(2012) , 10.1007/978-3-642-37300-8_5
Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, Dawn Song, Juxtapp: a scalable system for detecting code reuse among android applications international conference on detection of intrusions and malware and vulnerability assessment. pp. 62- 81 ,(2012) , 10.1007/978-3-642-37300-8_4
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning, Detecting repackaged smartphone applications in third-party android marketplaces Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12. pp. 317- 326 ,(2012) , 10.1145/2133601.2133640
Thanasis Petsas, Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos, Thomas Karagiannis, Rise of the planet of the apps: a systematic study of the mobile app ecosystem internet measurement conference. pp. 277- 290 ,(2013) , 10.1145/2504730.2504749
Federico Maggi, Andrea Valdi, Stefano Zanero, AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors security and privacy in smartphones and mobile devices. pp. 49- 54 ,(2013) , 10.1145/2516760.2516768
Hao Chen, Underground economy of android application plagiarism international workshop on security. pp. 1- 2 ,(2013) , 10.1145/2484417.2484419
Michael Grace, Yajin Zhou, Qiang Zhang, Shihong Zou, Xuxian Jiang, RiskRanker Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys '12. pp. 281- 294 ,(2012) , 10.1145/2307636.2307663
Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang, Shihong Zou, Fast, scalable detection of "Piggybacked" mobile applications Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13. pp. 185- 196 ,(2013) , 10.1145/2435349.2435377