2023
DOI: 10.1109/tse.2022.3215628
|View full text |Cite
|
Sign up to set email alerts
|

Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…LibDB [22] utilizes function contents as features and transforms binary functions into vector representations through neural network embeddings. Libloom [23] encodes package signatures and class signatures into two-level Bloom filters. LibScan [14] first fingerprints code features to establish potential class correspondences between the application and TPL classes.…”
Section: Related Work 61 Software Composition Analysismentioning
confidence: 99%
“…LibDB [22] utilizes function contents as features and transforms binary functions into vector representations through neural network embeddings. Libloom [23] encodes package signatures and class signatures into two-level Bloom filters. LibScan [14] first fingerprints code features to establish potential class correspondences between the application and TPL classes.…”
Section: Related Work 61 Software Composition Analysismentioning
confidence: 99%
“…There are many ways that providers can experience cyber threats and attacks, including brute force and distributed denial-of-service (DDoS), credential stuffing, person-in-the-middle and providers can also be made vulnerable in different ways, such as through interactions with clients and supplier third party software vulnerabilities ( 46 , 47 ). There are also factors such as human error and social engineering at play, including sophisticated spear phishing attacks that exploit cognitive biases and target disgruntled or vulnerable staff members to help cybercriminals steal information or use disguises to enter premises ( 46 – 49 ).…”
Section: The Pandemic Is Shifting Boundaries For Mental Health Suppor...mentioning
confidence: 99%
“…OSSPolice [19] have developed similarity measures based on strings. The special structure of Java programs allows using properties such as class and package inclusions [3,35] in order to identify Android libraries.…”
Section: Graph Similaritymentioning
confidence: 99%
“…For example, detecting malware clones is a major issue [4,17,55,71], as most malware are actually variants of a few major families active for more than five years 1 . Another application is the identification of libraries [3,19,31,35,67,68], which is both a software engineering issue and a cybersecurity issue due to vulnerabilities inside dynamically linked libraries. The problem of library identification, while in between programs and functions in terms of size, is much closer to the case of program clones by its nature -libraries are not arbitrary collections of functions and require inter-procedural analysis.…”
mentioning
confidence: 99%