“…The connection between carrier to rider is known as hook, which defines the point where the execution of malicious code can be triggered. State-of-the-art works have mainly focused on detecting piggybacked apps (or cloned apps in general) through similarity comparison [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31]. However, pairwise comparison based approaches are not scalable for analyzing millions of Android apps that are now available in various markets.…”