2016
DOI: 10.1007/978-3-319-30806-7_6
|View full text |Cite
|
Sign up to set email alerts
|

Semantics-Based Repackaging Detection for Mobile Apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 23 publications
0
13
0
Order By: Relevance
“…Semantic features are relevant as they allow to be resilient to most obfuscation techniques (e.g., method renaming). For example, the literature has shown that, input-output states of core methods [20] are semantic features which are more appropriate than the related syntactic features extracted from instructions in method definitions. In our study, findings F6 and F9 suggest that we can consider duplication of permissions and of capability declarations as semantic features characterizing piggybacking.…”
Section: Related Workmentioning
confidence: 99%
“…Semantic features are relevant as they allow to be resilient to most obfuscation techniques (e.g., method renaming). For example, the literature has shown that, input-output states of core methods [20] are semantic features which are more appropriate than the related syntactic features extracted from instructions in method definitions. In our study, findings F6 and F9 suggest that we can consider duplication of permissions and of capability declarations as semantic features characterizing piggybacking.…”
Section: Related Workmentioning
confidence: 99%
“…The results of those approaches, however, also need to be vetted through a comprehensive pairwise comparison (e.g., to confirm the final accuracy). Actually, like SimiDroid, the majority work in detecting similar Android apps at the moment are still based on pairwise similarity comparison [3], [6], [13].…”
Section: A Identifying Similar Android Appsmentioning
confidence: 99%
“…Most of repackaged app detection works [3], [6] indeed do not come with reusable tools for the research community. To the best of our knowledge, Androguard [7] and FSquaDRA [8] are the main publicly available tools for app similarity analysis.…”
Section: Introductionmentioning
confidence: 99%
“…The observed knowledge can then be used to invent advanced techniques for taming the Android app piggybacking problem. Although several approaches have been proposed to tackle this problem [34], [5], their associated datasets are not always released to public [35], [6], [31], [36]. In other words, the research on piggybacked apps is challenged by the scarcity of datasets and benchmarks.…”
Section: Approachmentioning
confidence: 99%
“…The connection between carrier to rider is known as hook, which defines the point where the execution of malicious code can be triggered. State-of-the-art works have mainly focused on detecting piggybacked apps (or cloned apps in general) through similarity comparison [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31]. However, pairwise comparison based approaches are not scalable for analyzing millions of Android apps that are now available in various markets.…”
Section: Introductionmentioning
confidence: 99%