Proceedings of the 2015 International Symposium on Software Testing and Analysis 2015
DOI: 10.1145/2771783.2771795
|View full text |Cite
|
Sign up to set email alerts
|

WuKong: a scalable and accurate two-phase approach to Android app clone detection

Abstract: Repackaged Android applications (app clones) have been found in many third-party markets, which not only compromise the copyright of original authors, but also pose threats to security and privacy of mobile users. Both fine-grained and coarse-grained approaches have been proposed to detect app clones. However, fine-grained techniques employing complicated clone detection algorithms are difficult to scale to hundreds of thousands of apps, while coarse-grained techniques based on simple features are scalable but… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
115
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 175 publications
(118 citation statements)
references
References 49 publications
2
115
1
Order By: Relevance
“…We consider that the false positive rate of FUIDroid is actually determined by the performance of UI-based detection system. After analyzing many previous works [4,[8][9][10], we find out that the false positive occurs mainly under one case. When different apps include the same third-party libraries, the similarity between them may anomalously increase.…”
Section: False Positivementioning
confidence: 99%
See 3 more Smart Citations
“…We consider that the false positive rate of FUIDroid is actually determined by the performance of UI-based detection system. After analyzing many previous works [4,[8][9][10], we find out that the false positive occurs mainly under one case. When different apps include the same third-party libraries, the similarity between them may anomalously increase.…”
Section: False Positivementioning
confidence: 99%
“…This hybrid approach depends upon three parameters-Description Mapping, Interface Analysis, and Source Code Analysis-to identify a unique application. Wukong [4] proposes a two-phase approach to detect app clones and uses an accurate and automated clustering-based approach to filter third-party libraries.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Most of repackaged app detection works [3], [6] indeed do not come with reusable tools for the research community. To the best of our knowledge, Androguard [7] and FSquaDRA [8] are the main publicly available tools for app similarity analysis.…”
Section: Introductionmentioning
confidence: 99%