Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph

被引:0
|
作者
Sun, Xin [1 ]
Zhongyang, Yibing [1 ]
Xin, Zhi [1 ]
Mao, Bing [1 ]
Xie, Li [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Dept Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
关键词
Mobile Applications; Code Reuse; Repackaging; Malware Variants;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently smartphones and mobile devices have gained incredible popularity for their vibrant feature-rich applications (or apps). Because it is easy to repackage Android apps, software plagiarism has become a serious problem. In this paper, we present an accurate and robust system DroidSim to detect code reuse. DroidSim calculates similarity score only with component-based control flow graph (CB-CFG). CB-CFG is a graph of which nodes are Android APIs and edges represent control flow precedence order in each Android component. Our system can be applied to detect repackaged apps and malware variants. We evaluate DroidSim on 121 apps and 706 malware variants. The results show that our system has no false negative and a false positive of 0.83% for repackaged apps, and a detection ratio of 96.60% for malware variants. Besides, ADAM is used to obfuscate apps and the result reveals that ADAM has no influence on our system.
引用
收藏
页码:142 / 155
页数:14
相关论文
共 50 条
  • [21] MIREA: Component-based Middleware for Reconfigurable, Embedded Control Applications
    Kwon, Jagun
    Hailes, Stephen
    2010 IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT CONTROL, 2010, : 2385 - 2390
  • [22] The component balancer: Optimization of component-based applications
    Fontana, J
    INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2004, : 338 - 339
  • [23] A Component Model for Separation of Control Flow from Computation in Component-Based Systems
    Lau, Kung-Kiu
    Ukis, Vladyslav
    Velasco, Perla
    Wang, Zheng
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 163 (01) : 57 - 69
  • [24] Component-based software reuse on the World Wide Web
    Sang, Da-yong
    Wang, Ying
    Wuhan University Journal of Natural Sciences, 2000, 5 (01) : 31 - 34
  • [25] Detect Android Malware Variants using Component Based Topology Graph
    Shen, Tong
    Zhongyang, Yibing
    Xin, Zhi
    Mao, Bing
    Huang, Hao
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 406 - 413
  • [26] Optimizing execution of component-based applications using group instances
    Beynon, MD
    Kurc, T
    Sussman, A
    Saltz, J
    FIRST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, PROCEEDINGS, 2001, : 56 - 63
  • [27] Optimizing execution of component-based applications using group instances
    Beynon, MD
    Kurc, T
    Sussman, A
    Saltz, J
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2002, 18 (04): : 435 - 448
  • [28] Synthesizing component-based WSN applications via automatic combination of code optimization techniques
    Zhang, Zhenyu
    Chan, W. K.
    Tse, T. H.
    USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 181 - +
  • [29] Component-based programming of distributed applications
    Issarny, V
    Bellissard, L
    Riveill, M
    Zarras, A
    ADVANCES IN DISTRIBUTED SYSTEMS: ADVANCED DISTRIBUTED COMPUTING: FROM ALGORITHMS TO SYSTEMS, 2000, 1752 : 327 - 353
  • [30] Performance prediction of component-based applications
    Chen, SP
    Yan, L
    Gorton, I
    Liu, A
    JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 74 (01) : 35 - 43