DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level

被引:21
|
作者
Akram, Junaid [1 ]
Shi, Zhendong [1 ]
Mumtaz, Majid [1 ]
Ping, Luo [1 ]
机构
[1] Tsinghua Univ, Sch Software Engn, State Key Lab Informat Secur, Beijing, Peoples R China
关键词
Clone detection; Software reuse; Android evolution; Reverse engineering; Similarity detection; Mobile security; NICAD;
D O I
10.1109/COMPSAC.2018.00021
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Android became more popular and widely used operating system. It has been noticed that the code clones in Android apps make it difficult to maintain the security flaws in source code. To avoid these problems, it is essential to find, identify, evaluate and recover those code clones as early as possible. In this paper, we propose and design DroidCC, a novel clone detection approach in Android applications, that helps to detect different types of clones from APK's source code. A prototype has been developed and implemented on the dataset of almost 30,000 top rated Android apps. DroidCC detects type-1, type-2 and type-3 clones in Android apps at the source code level. It also detects the similar code fragments, that were injected into many applications, which might be an indication of spreading malware. Meanwhile it can detect full and partial level similarity between applications. We evaluate DroidCC clone detection approach on real time data-set and count the Recall and Precision, which is quite significant. Furthermore, our results show that our approach is very efficient and effective in detecting different types of clones to check the similarity level in Android applications.
引用
收藏
页码:100 / 105
页数:6
相关论文
共 50 条
  • [1] DroidMD: An efficient and scalable Android malware detection approach at source code level
    Akram J.
    Mumtaz M.
    Jabeen G.
    Luo P.
    [J]. International Journal of Information and Computer Security, 2021, 15 (2-3) : 299 - 321
  • [2] Scalable Source Code Similarity Detection in Large Code Repositories
    Alomari, Firas
    Harbi, Muhammed
    [J]. EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2019, 6 (22) : 1 - 11
  • [3] Source Code Clone Detection Using Unsupervised Similarity Measures
    Martinez-Gil, Jorge
    [J]. SOFTWARE QUALITY AS A FOUNDATION FOR SECURITY, SWQD 2024, 2024, 505 : 21 - 37
  • [4] A systematic literature review on source code similarity measurement and clone detection: Techniques, applications, and challenges
    Zakeri-Nasrabadi, Morteza
    Parsa, Saeed
    Ramezani, Mohammad
    Roy, Chanchal
    Ekhtiarzadeh, Masoud
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 204
  • [5] Cross-Language Code Similarity and Applications in Clone Detection and Code Search
    Mathew, George Varghese
    [J]. ProQuest Dissertations and Theses Global, 2022,
  • [6] AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android Apps
    Foroughipour, Ardalan
    Stakhanova, Natalia
    Abazari, Farzaneh
    Sistany, Bahman
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (SEC 2022), 2022, 648 : 379 - 397
  • [7] Clone Analysis and Detection in Android Applications
    Niu, Haofei
    Yang, Tianchang
    Niu, Shaozhang
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2016, : 520 - 525
  • [8] Android Botnet Detection An Integrated Source Code Mining Approach
    Alothman, Basil
    Rattadilok, Prapa
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 111 - 115
  • [9] Boreas: An Accurate and Scalable Token-Based Approach to Code Clone Detection
    Yuan, Yang
    Guo, Yao
    [J]. 2012 PROCEEDINGS OF THE 27TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2012, : 286 - 289
  • [10] Indexing source code and clone detection
    Tronicek, Zdenek
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2022, 144