File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/2664243.2664275
- Scopus: eid_2-s2.0-84954509918
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Towards a scalable resource-driven approach for detecting repackaged android applications
Title | Towards a scalable resource-driven approach for detecting repackaged android applications |
---|---|
Authors | |
Issue Date | 2014 |
Citation | Proceedings of the 30th Annual Computer Security Applications Conference, 2014, p. 56-65 How to Cite? |
Abstract | Repackaged Android applications (or simply apps) are one of the major sources of mobile malware and also an important cause of severe revenue loss to app developers. Although a number of solutions have been proposed to detect repackaged apps, the majority of them heavily rely on code analysis, thus suffering from two limitations: (1) poor scalability due to the billion opcode problem; (2) unreliability to code obfuscation/app hardening techniques. In this paper, we explore an alternative approach that exploits core resources, which have close relationships with codes, to detect repackaged apps. More precisely, we define new features for characterizing apps, investigate two kinds of algorithms for searching similar apps, and propose a two-stage methodology to speed up the detection. We realize our approach in a system named ResDroid and conduct large scale evaluation on it. The results show that ResDroid can identify repackaged apps efficiently and effectively even if they are protected by obfuscation or hardening systems. |
Persistent Identifier | http://hdl.handle.net/10722/303472 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shao, Yuru | - |
dc.contributor.author | Luo, Xiapu | - |
dc.contributor.author | Qian, Chenxiong | - |
dc.contributor.author | Zhu, Pengfei | - |
dc.contributor.author | Zhang, Lei | - |
dc.date.accessioned | 2021-09-15T08:25:23Z | - |
dc.date.available | 2021-09-15T08:25:23Z | - |
dc.date.issued | 2014 | - |
dc.identifier.citation | Proceedings of the 30th Annual Computer Security Applications Conference, 2014, p. 56-65 | - |
dc.identifier.uri | http://hdl.handle.net/10722/303472 | - |
dc.description.abstract | Repackaged Android applications (or simply apps) are one of the major sources of mobile malware and also an important cause of severe revenue loss to app developers. Although a number of solutions have been proposed to detect repackaged apps, the majority of them heavily rely on code analysis, thus suffering from two limitations: (1) poor scalability due to the billion opcode problem; (2) unreliability to code obfuscation/app hardening techniques. In this paper, we explore an alternative approach that exploits core resources, which have close relationships with codes, to detect repackaged apps. More precisely, we define new features for characterizing apps, investigate two kinds of algorithms for searching similar apps, and propose a two-stage methodology to speed up the detection. We realize our approach in a system named ResDroid and conduct large scale evaluation on it. The results show that ResDroid can identify repackaged apps efficiently and effectively even if they are protected by obfuscation or hardening systems. | - |
dc.language | eng | - |
dc.relation.ispartof | Proceedings of the 30th Annual Computer Security Applications Conference | - |
dc.title | Towards a scalable resource-driven approach for detecting repackaged android applications | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/2664243.2664275 | - |
dc.identifier.scopus | eid_2-s2.0-84954509918 | - |
dc.identifier.spage | 56 | - |
dc.identifier.epage | 65 | - |