Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph

被引:0
|
作者
Sun, Xin [1 ]
Zhongyang, Yibing [1 ]
Xin, Zhi [1 ]
Mao, Bing [1 ]
Xie, Li [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Dept Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
关键词
Mobile Applications; Code Reuse; Repackaging; Malware Variants;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently smartphones and mobile devices have gained incredible popularity for their vibrant feature-rich applications (or apps). Because it is easy to repackage Android apps, software plagiarism has become a serious problem. In this paper, we present an accurate and robust system DroidSim to detect code reuse. DroidSim calculates similarity score only with component-based control flow graph (CB-CFG). CB-CFG is a graph of which nodes are Android APIs and edges represent control flow precedence order in each Android component. Our system can be applied to detect repackaged apps and malware variants. We evaluate DroidSim on 121 apps and 706 malware variants. The results show that our system has no false negative and a false positive of 0.83% for repackaged apps, and a detection ratio of 96.60% for malware variants. Besides, ADAM is used to obfuscate apps and the result reveals that ADAM has no influence on our system.
引用
收藏
页码:142 / 155
页数:14
相关论文
共 50 条
  • [31] Component-based programming of distributed applications
    Issarny, Valérie
    Bellissard, Luc
    Riveill, Michel
    Zarras, Apostolos
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2000, 1752 : 327 - 353
  • [32] Dynamic reconfiguration of component-based applications
    Batista, T
    Rodriguez, N
    INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2000, : 32 - 39
  • [33] Automatic deployment of component-based applications
    Lascu, Tudor A.
    Mauro, Jacopo
    Zavattaro, Gianluigi
    SCIENCE OF COMPUTER PROGRAMMING, 2015, 113 : 261 - 284
  • [34] Language-based access control approach for component-based software applications
    Su, R.
    Lukkien, J. J.
    Chaudron, M. R. V.
    IET SOFTWARE, 2007, 1 (05) : 206 - 216
  • [35] A language-based access control approach for component-based software applications
    Su, Rong
    Lukkien, Johan J.
    Chaudron, Michel R. V.
    PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND APPLICATIONS, 2006, : 233 - +
  • [36] A component-based architecture for integrating fieldbus systems into distributed control applications
    Bachmann, R
    Hoang, MS
    Rieger, P
    FIELDBUS TECHNOLOGY: SYSTEMS INTEGRATION, NETWORKING, AND ENGINEERING, 1999, : 276 - 283
  • [37] On the Effectiveness of Code-Reuse-Based Android Application Obfuscation
    Tang, Xiaoxiao
    Liang, Yu
    Ma, Xinjie
    Lin, Yan
    Gao, Debin
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 : 333 - 349
  • [38] Questionnaires: a framework using mobile code for component-based tele-exams
    Hummes, J
    Kohrs, A
    Merialdo, B
    SEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '98), 1998, : 144 - 149
  • [39] A reuse approach of description for component-based distributed software architecture
    Cao, M
    Wu, GF
    Wang, YY
    Current Trends in High Performance Computing and Its Applications, Proceedings, 2005, : 215 - 220
  • [40] Developing component-based tools for requirements reuse: A process guide
    Lam, W
    EIGHTH IEEE INTERNATIONAL WORKSHOP ON SOFTWARE TECHNOLOGY AND ENGINEERING PRACTICE INCORPORATING COMPUTER AIDED SOFTWARE ENGINEERING, PROCEEDINGS, 1997, : 473 - 483