Proceedings of the Web Conference 2020 2020
DOI: 10.1145/3366423.3380243
|View full text |Cite
|
Sign up to set email alerts
|

Mobile App Squatting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
2

Relationship

3
5

Authors

Journals

citations
Cited by 34 publications
(11 citation statements)
references
References 35 publications
0
11
0
Order By: Relevance
“…Typosquatting specifically, refers to attackers registering mistyped domain names (such as twitte.com) in an attempt to capture all the traffic from users who mistype a website's URL in their browsers. Past research has characterized the typosquatting abuse in the wild [14], [17], [28], [35], [52], [45] as well as the effects of typos in related areas, such as, website development [36], package managers [2], and mobile app stores [27]. In this paper, we discovered that while typos are one of the reasons for unintended URLs (where a Twitter user intends to tweet one URL but tweets another), the main culprit of unintended URLs is the semantic gap between what a user types (such as a sentence with a missing space or an Instagram ID) and what Twitter infers that that user typed (i.e., a URL).…”
Section: Related Workmentioning
confidence: 99%
“…Typosquatting specifically, refers to attackers registering mistyped domain names (such as twitte.com) in an attempt to capture all the traffic from users who mistype a website's URL in their browsers. Past research has characterized the typosquatting abuse in the wild [14], [17], [28], [35], [52], [45] as well as the effects of typos in related areas, such as, website development [36], package managers [2], and mobile app stores [27]. In this paper, we discovered that while typos are one of the reasons for unintended URLs (where a Twitter user intends to tweet one URL but tweets another), the main culprit of unintended URLs is the semantic gap between what a user types (such as a sentence with a missing space or an Instagram ID) and what Twitter infers that that user typed (i.e., a URL).…”
Section: Related Workmentioning
confidence: 99%
“…To increase the chance of getting more infections, attackers register package names that are similar to existing (usually popular) packages by package typosquatting or package combosquatting ( [5], [6]) in which they split the package name into elements based on the "hyphen" character, and rearrange the elements, e.g., "python-nmap" into "nmap-python". Users who mistype or confuse the package name will install the malicious package instead of the legitimate one.…”
Section: Crafting and Shipping Malicious Packagesmentioning
confidence: 99%
“…Hence, our proposed approach relies on the Levenshtein distance applicable to most of the PyPI ecosystem packages. To capture packages with short names, we plan to use common name patterns (e.g., repeated or swapped characters)( [5], [8]).…”
Section: Threats To Validitymentioning
confidence: 99%
“…Software clone exists since PC era and appears on Android platform more extensively owing to the openness and popularity of Android system. In the context of app clone, the plagiarists' goal is to grab subscribers and gain fame by copying the core function [5], [6], the UI [7]- [9], and even product names and brands of legal apps [10], [11]. Clint et al [5] reported that repackaging apps will result in a 14% decrease in advertising revenue for the hardworking developers of original apps.…”
Section: Introductionmentioning
confidence: 99%