Proceedings of the Second ACM Conference on Data and Application Security and Privacy 2012
DOI: 10.1145/2133601.2133640
|View full text |Cite
|
Sign up to set email alerts
|

Detecting repackaged smartphone applications in third-party android marketplaces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
330
0
5

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 483 publications
(338 citation statements)
references
References 10 publications
3
330
0
5
Order By: Relevance
“…DroidMoss [16] is another approach dealing with the similarity detection issue in using opcode. Firstly, all opcodes are extracted from applications and then a piecewise hashing is computed to compare applications.…”
Section: Related Workmentioning
confidence: 99%
“…DroidMoss [16] is another approach dealing with the similarity detection issue in using opcode. Firstly, all opcodes are extracted from applications and then a piecewise hashing is computed to compare applications.…”
Section: Related Workmentioning
confidence: 99%
“…This is problematic because app similarity detection tools should not consider library code when analyzing apps for similarity. Prior approaches [16,33] identified libraries using white lists and manual efforts; however, these approaches are inherently not scalable and prone to omission. In contrast, AnDarwin automatically detects libraries by leveraging the results of its clustering of similar code (Section 4.2).…”
Section: Excluding Library Codementioning
confidence: 99%
“…DEXCD [18] detects Android clones by comparing similarities in streams of tokens from Android DEX files. DroidMOSS [33] computes a series of fingerprints for each app based on the fuzzy hashes of consecutive opcodes, ignoring operands. Apps are then compared pairwise for repackaging by calculating the edit distance between the overall fingerprint of each app.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Disguising as a normal application, it leaks personal or financial information of users by causing damages often [9], [14], [15]. And Update attack is a method that installs a malicious app when a user downloads an update.…”
Section: A Characteristics Of Malicious Android Applicationsmentioning
confidence: 99%