Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph

被引:0
|
作者
Sun, Xin [1 ]
Zhongyang, Yibing [1 ]
Xin, Zhi [1 ]
Mao, Bing [1 ]
Xie, Li [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Dept Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
关键词
Mobile Applications; Code Reuse; Repackaging; Malware Variants;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently smartphones and mobile devices have gained incredible popularity for their vibrant feature-rich applications (or apps). Because it is easy to repackage Android apps, software plagiarism has become a serious problem. In this paper, we present an accurate and robust system DroidSim to detect code reuse. DroidSim calculates similarity score only with component-based control flow graph (CB-CFG). CB-CFG is a graph of which nodes are Android APIs and edges represent control flow precedence order in each Android component. Our system can be applied to detect repackaged apps and malware variants. We evaluate DroidSim on 121 apps and 706 malware variants. The results show that our system has no false negative and a false positive of 0.83% for repackaged apps, and a detection ratio of 96.60% for malware variants. Besides, ADAM is used to obfuscate apps and the result reveals that ADAM has no influence on our system.
引用
收藏
页码:142 / 155
页数:14
相关论文
共 50 条
  • [41] Reuse in component-based prototyping: an industrial experience report from 15 years of reuse
    Laborde, Pierre
    Costiou, Steven
    Le Pors, Eric
    Plantec, Alain
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2022, 18 (01) : 155 - 169
  • [42] Component-Based Java']Java Legacy Code Refactoring
    Arboleda, Hugo
    Paz, Andres
    Royer, Jean-Claude
    REVISTA FACULTAD DE INGENIERIA-UNIVERSIDAD DE ANTIOQUIA, 2013, (68): : 104 - 114
  • [43] VDetector: Detecting vulnerability based on inter-component data flows in Android applications
    Huang, Kun
    Liu, Xuchong
    Wang, Weiping
    Wang, Haodong
    2019 15TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2019), 2019, : 321 - 326
  • [44] A framework for detecting interface violations in component-based software
    Edwards, SH
    Shakir, G
    Sitaraman, M
    Weide, BW
    Hollingsworth, J
    FIFTH INTERNATIONAL CONFERENCE ON SOFTWARE REUSE - PROCEEDINGS, 1998, : 46 - 55
  • [45] Component-based Modeling and Code Synthesis for Cyclic Programs
    Zhou, Min
    Wan, Hai
    Su, Chen
    Yin, Liangze
    Zhang, Lianyi
    He, Fei
    Gu, Ming
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 569 - 578
  • [46] Reuse in component-based prototyping: an industrial experience report from 15 years of reuse
    Pierre Laborde
    Steven Costiou
    Éric Le Pors
    Alain Plantec
    Innovations in Systems and Software Engineering, 2022, 18 : 155 - 169
  • [47] A graph-based model for component-based software development
    Sedigh-Ali, S
    Ghafoor, A
    WORDS 2005: 10TH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE, PROCEEDINGS, 2005, : 254 - 259
  • [48] A Component-Based Access Control Monitor
    Liu, Zhiming
    Morisset, Charles
    Stolz, Volker
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION, PROCEEDINGS, 2008, 17 : 339 - 353
  • [49] A recommender system for component-based applications using machine learning techniques
    Jesus Fernandez-Garcia, Antonio
    Iribarne, Luis
    Corral, Antonio
    Criado, Javier
    Wang, James Z.
    KNOWLEDGE-BASED SYSTEMS, 2019, 164 : 68 - 84
  • [50] Control Flow Obfuscation Based Protection Method for Android Applications
    Peng, Yong
    Su, Guanyu
    Tian, Bin
    Sun, Maohua
    Li, Qi
    CHINA COMMUNICATIONS, 2017, 14 (11) : 247 - 259