2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS) 2017
DOI: 10.1109/icpads.2017.00015
|View full text |Cite
|
Sign up to set email alerts
|

AppIS: Protect Android Apps Against Runtime Repackaging Attacks

Abstract: Apps repackaged through reverse engineering pose a significant security threat to the Android smart phone ecosystem. Previous solutions have mostly focused on the detection and identification of repackaged apps. Nevertheless, current app anti-repackaging services can only protect applications at a coarse level and have significant performance overhead. These approaches can neither meet the performance requirements of Android nor achieve fine-grained protection against cumulative attack 1 at the same time. Spec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Several studies have been carried out on Android permission requests [26], Android user privacy [27], attacks on Android and other mobile platforms [28,29], including malware attacks [30], synchronous channels attack [31], side-channel attacks [32], runtime repackaging attacks [33], and Man-in-the-Middle attacks [34] accuracy. This section of the paper provides a brief examination of some of the related works carried out.…”
Section: Permission-based Detection and Feature Extractionmentioning
confidence: 99%
“…Several studies have been carried out on Android permission requests [26], Android user privacy [27], attacks on Android and other mobile platforms [28,29], including malware attacks [30], synchronous channels attack [31], side-channel attacks [32], runtime repackaging attacks [33], and Man-in-the-Middle attacks [34] accuracy. This section of the paper provides a brief examination of some of the related works carried out.…”
Section: Permission-based Detection and Feature Extractionmentioning
confidence: 99%
“…RE techniques have been used with mobile applications for many purposes not just for detecting anti-patterns. Song et al (2017) used RE for improving the security of Android applications. While Zhou et al (2018) used the RE technique to detect logging classes and to remove logging calls and unnecessary instructions.…”
Section: Related Workmentioning
confidence: 99%
“…RE techniques have been used with mobile applications for many purposes not just for detecting antipatterns. Song, L. et al (2017) used RE for improving the security of Android applications. While Zhou, X. et al (2018) used the RE technique to detect logging classes and to remove logging calls and unnecessary instructions.…”
Section: Related Workmentioning
confidence: 99%