AnDarwin: Scalable Detection of Semantically Similar Android Applications

作者: Jonathan Crussell , Clint Gibler , Hao Chen

DOI: 10.1007/978-3-642-40203-6_11

关键词:

摘要: The popularity and utility of smartphones rely on their vibrant application markets; however, plagiarism threatens the long-term health these markets. We present a scalable approach to detecting similar Android apps based semantic information. implement our in tool called AnDarwin evaluate it 265,359 collected from 17 markets including Google Play numerous thirdparty In contrast earlier approaches, has four advantages: avoids comparing pairwise, thus greatly improving its scalability; analyzes only app code does not other information - such as app’s market, signature, or description increasing reliability; can detect both full partial similarity; automatically library remove similarity analysis. two use cases for AnDarwin: finding by different developers (“clones”) same developer (“rebranded”). ten hours, detected at least 4,295 that have been victims cloning 36,106 are rebranded. By analyzing clusters found AnDarwin, we 88 new variants malware identified 169 malicious differences requested permissions. Our evaluation demonstrates AnDarwin’s ability accurately large scale.

参考文章(19)
Jonathan Crussell, Clint Gibler, Hao Chen, Attack of the Clones: Detecting Cloned Applications on Android Markets Computer Security – ESORICS 2012. pp. 37- 54 ,(2012) , 10.1007/978-3-642-33167-1_3
Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, Dawn Song, Juxtapp: a scalable system for detecting code reuse among android applications international conference on detection of intrusions and malware and vulnerability assessment. pp. 62- 81 ,(2012) , 10.1007/978-3-642-37300-8_4
Raghavan Komondoor, Susan Horwitz, Using Slicing to Identify Duplication in Source Code static analysis symposium. pp. 40- 56 ,(2001) , 10.1007/3-540-47764-0_3
Anand Rajaraman, Jeffrey D Ullman, Mining of Massive Datasets ,(2011)
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning, Detecting repackaged smartphone applications in third-party android marketplaces Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12. pp. 317- 326 ,(2012) , 10.1145/2133601.2133640
Andrei Z. Broder, Moses Charikar, Alan M. Frieze, Michael Mitzenmacher, Min-wise independent permutations (extended abstract) symposium on the theory of computing. pp. 327- 336 ,(1998) , 10.1145/276698.276781
Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang, Shihong Zou, Fast, scalable detection of "Piggybacked" mobile applications Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13. pp. 185- 196 ,(2013) , 10.1145/2435349.2435377
Andrei Z Broder, Moses Charikar, Alan M Frieze, Michael Mitzenmacher, Min-Wise Independent Permutations symposium on the theory of computing. ,vol. 60, pp. 630- 659 ,(2000) , 10.1006/JCSS.1999.1690
Z. Li, S. Lu, S. Myagmar, Y. Zhou, CP-Miner: finding copy-paste and related bugs in large-scale software code IEEE Transactions on Software Engineering. ,vol. 32, pp. 176- 192 ,(2006) , 10.1109/TSE.2006.28
B.S. Baker, On finding duplication and near-duplication in large software systems working conference on reverse engineering. pp. 86- 95 ,(1995) , 10.1109/WCRE.1995.514697