A Rapid and Scalable Method for Android Application Repackaging Detection

被引:8
|
作者
Jiao, Sibei [1 ]
Cheng, Yao [1 ]
Ying, Lingyun [1 ]
Su, Purui [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing 100864, Peoples R China
关键词
Android Malware; Repackaged Application Detection; Image Similarity;
D O I
10.1007/978-3-319-17533-1_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays the security issues of Android applications (apps) are more and more serious. One of the main security threats come from repackaged apps. There already are some researches detecting repackaged apps using similarity measurement. However, so far, all the existing techniques for repackaging detection are based on code similarity or feature (e.g., permission set) similarity evaluation. In this paper, we propose a novel approach called ImageStruct that applies image similarity technique to locate and detect the changes coming from repackaging effectively. ImageStruct performs a quick repackaging detection by considering the similarity of images in target apps. The intuition behind our approach is that the repackaged apps still need to maintain the "look and feel" of the original apps by including the original images, even they might have their additional code included or some of the original code removed. To prove the effectiveness and evaluate the reliability of our approach, we carry out the compare experiments between ImageStruct and the code based similarity scores of AndroGuard. The results demonstrate that ImageStruct is not only with good performance and scalability, but also able to resistant to code obfuscation.
引用
收藏
页码:349 / 364
页数:16
相关论文
共 50 条
  • [1] A Scalable Cloud-Based Android App Repackaging Detection Framework
    Li, Jinghua
    Liu, Xiaoyan
    Zhang, Huixiang
    Mu, Dejun
    GREEN, PERVASIVE, AND CLOUD COMPUTING, 2016, 9663 : 113 - 125
  • [2] RepDroid: An Automated Tool for Android Application Repackaging Detection
    Yue, Shengtao
    Feng, Weizan
    Ma, Jun
    Jiang, Yanyan
    Tao, Xianping
    Xu, Chang
    Lu, Jian
    2017 IEEE/ACM 25TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC), 2017, : 132 - 142
  • [3] Scalable and Obfuscation-Resilient Android App Repackaging Detection Based on Behavior Birthmark
    Yuan, Cangzhou
    Wei, Shenhong
    Zhou, Chengjian
    Guo, Jiangtao
    Xiang, Hongyue
    2017 24TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2017), 2017, : 476 - 485
  • [4] Resilient Decentralized Android Application Repackaging Detection Using Logic Bombs
    Zeng, Qiang
    Luo, Lannan
    Qian, Zhiyun
    Du, Xiaojiang
    Li, Zhoujun
    PROCEEDINGS OF THE 2018 INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION (CGO'18), 2018, : 50 - 61
  • [5] Android Applications Repackaging Detection Techniques for Smartphone Devices
    Rastogi, Sajal
    Bhushan, Kriti
    Gupta, B. B.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 26 - 32
  • [6] You can't touch this: Consumer-centric android application repackaging detection
    Gurulian, Iakovos
    Markantonakis, Konstantinos
    Cavallaro, Lorenzo
    Mayes, Keith
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 65 : 1 - 9
  • [7] Reprint of “You can't touch this: Consumer-centric android application repackaging detection”
    Gurulian I.
    Markantonakis K.
    Cavallaro L.
    Mayes K.
    Future Generation Computer Systems, 2018, 80 : 537 - 545
  • [8] AnDarwin: Scalable Detection of Android Application Clones Based on Semantics
    Crussell, Jonathan
    Gibler, Clint
    Chen, Hao
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (10) : 2007 - 2019
  • [9] SPRD: fast application repackaging detection approach in Android based on application's UI and program dependency graph
    Wang R.
    Wang L.
    Tang B.
    Zhao L.
    Tongxin Xuebao/Journal on Communications, 2018, 39 (03): : 159 - 171
  • [10] Evaluation of Resource-Based App Repackaging Detection in Android
    Gadyatskaya, Olga
    Lezza, Andra-Lidia
    Zhauniarovich, Yury
    SECURE IT SYSTEMS, NORDSEC 2016, 2016, 10014 : 135 - 151