Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering 2017
DOI: 10.1145/3106237.3106305
|View full text |Cite
|
Sign up to set email alerts
|

CodeMatch: obfuscation won't conceal your repackaged app

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(28 citation statements)
references
References 25 publications
0
28
0
Order By: Relevance
“…A number of works detail different obfuscation techniques in general [6,12,13,52], for the Java programming language [10,30,46], and for Android apps in particular [22,25,44]. Other work relating to obfuscation in Android apps has focused on reversing the effects of obfuscation [5,49] or on detecting certain features of an app despite obfuscation, like code reuse [26,28,34,53], the detection of repacked malware [23,24,35,47], or identification of third-party libraries [2,38].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A number of works detail different obfuscation techniques in general [6,12,13,52], for the Java programming language [10,30,46], and for Android apps in particular [22,25,44]. Other work relating to obfuscation in Android apps has focused on reversing the effects of obfuscation [5,49] or on detecting certain features of an app despite obfuscation, like code reuse [26,28,34,53], the detection of repacked malware [23,24,35,47], or identification of third-party libraries [2,38].…”
Section: Related Workmentioning
confidence: 99%
“…These markets have enabled the quick and simple distribution of new software, but they have also enabled numerous studies of application security [17][18][19], and provided mechanisms to identify malware on devices before or after infection [9,37]. Much of this research depends on automated and or manual software analysis techniques, and these techniques face challenges in the presence of software obfuscation [14,26,28,34,53], software transformations designed to frustrate automatic or manual analysis.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, we investigate how the accuracy of repackaged [19] (10000,100000) DR-Droid2 [20] (1000,10000) DAPASA [21] (10000,100000) FUIDroid [22] (10000,100000) APPraiser [23] (1000000, ∞) RepDroid [24] (100,1000) SimiDroid [25] (1000,10000) GroupDroid [26] (1000,10000) CLANdroid [27] (10000,100000) DR-Droid [28] (1000,10000) DroidClone [29] (100,1000) FSquaDRA2 [30] (1000,10000) Li et al [31] α (1000000, ∞) Niu et al [32] -RepDetector [33] (1000,10000) SUIDroid [34] (100000,1000000) Kim et al [35] (100,1000) AndroidSOO [36] (10000,100000) AndroSimilar2 [37] (10000,100000) Chen et al [38] (1000,10000) DroidEagle [39] (1000000, ∞) ImageStruct [40] (10000,100000) MassVet [41] (1000000, ∞) PICARD [42] (0,100) Soh et al [43] (100,1000) Wu et al [44] (1000,10000) WuKong [45] (100000,1000000) AnDarwin2 [46] (100000,1000000) AndRadar [47] (100000,1000000) Chen et al [48] (10000,100000) DIVILAR [49] (0,100) DroidKin [50] (1000,10000) DroidLegacy [51] (1000,10000) DroidMarking [9] (100,1000) DroidSim [52] (100,1000) FSquaDRA [53] (10000,100000) Kywe et al [54] (10000,100000) Linares-Vásquez et al [55] α (10000,100000) PlayDrone [56] α (1000000, ∞) ResDroid [57] (1000...…”
Section: Review Of Evaluation Setups and Artefactsmentioning
confidence: 99%
“…The third kind leverages lib detection methods. CodeMatch [31] filters out libraries used in apps then compares the hash of their remnant. Wukong [32] detects repackage apps in two steps, but that it processes the second step by using a counting-based code clone detection approach, instead of hash.…”
Section: Related Workmentioning
confidence: 99%