File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Towards a scalable resource-driven approach for detecting repackaged android applications

TitleTowards a scalable resource-driven approach for detecting repackaged android applications
Authors
Issue Date2014
Citation
Proceedings of the 30th Annual Computer Security Applications Conference, 2014, p. 56-65 How to Cite?
AbstractRepackaged Android applications (or simply apps) are one of the major sources of mobile malware and also an important cause of severe revenue loss to app developers. Although a number of solutions have been proposed to detect repackaged apps, the majority of them heavily rely on code analysis, thus suffering from two limitations: (1) poor scalability due to the billion opcode problem; (2) unreliability to code obfuscation/app hardening techniques. In this paper, we explore an alternative approach that exploits core resources, which have close relationships with codes, to detect repackaged apps. More precisely, we define new features for characterizing apps, investigate two kinds of algorithms for searching similar apps, and propose a two-stage methodology to speed up the detection. We realize our approach in a system named ResDroid and conduct large scale evaluation on it. The results show that ResDroid can identify repackaged apps efficiently and effectively even if they are protected by obfuscation or hardening systems.
Persistent Identifierhttp://hdl.handle.net/10722/303472

 

DC FieldValueLanguage
dc.contributor.authorShao, Yuru-
dc.contributor.authorLuo, Xiapu-
dc.contributor.authorQian, Chenxiong-
dc.contributor.authorZhu, Pengfei-
dc.contributor.authorZhang, Lei-
dc.date.accessioned2021-09-15T08:25:23Z-
dc.date.available2021-09-15T08:25:23Z-
dc.date.issued2014-
dc.identifier.citationProceedings of the 30th Annual Computer Security Applications Conference, 2014, p. 56-65-
dc.identifier.urihttp://hdl.handle.net/10722/303472-
dc.description.abstractRepackaged Android applications (or simply apps) are one of the major sources of mobile malware and also an important cause of severe revenue loss to app developers. Although a number of solutions have been proposed to detect repackaged apps, the majority of them heavily rely on code analysis, thus suffering from two limitations: (1) poor scalability due to the billion opcode problem; (2) unreliability to code obfuscation/app hardening techniques. In this paper, we explore an alternative approach that exploits core resources, which have close relationships with codes, to detect repackaged apps. More precisely, we define new features for characterizing apps, investigate two kinds of algorithms for searching similar apps, and propose a two-stage methodology to speed up the detection. We realize our approach in a system named ResDroid and conduct large scale evaluation on it. The results show that ResDroid can identify repackaged apps efficiently and effectively even if they are protected by obfuscation or hardening systems.-
dc.languageeng-
dc.relation.ispartofProceedings of the 30th Annual Computer Security Applications Conference-
dc.titleTowards a scalable resource-driven approach for detecting repackaged android applications-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1145/2664243.2664275-
dc.identifier.scopuseid_2-s2.0-84954509918-
dc.identifier.spage56-
dc.identifier.epage65-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats