Detecting repackaged smartphone applications in third-party android marketplaces

@inproceedings{Zhou2012DetectingRS,
  title={Detecting repackaged smartphone applications in third-party android marketplaces},
  author={Wu Zhou and Yajin Zhou and Xuxian Jiang and Peng Ning},
  booktitle={CODASPY '12},
  year={2012}
}
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone applications. These smartphone applications (or apps), typically organized in different application marketplaces, can be conveniently browsed by mobile users and then simply clicked to install on a variety of mobile devices. In practice, besides the official marketplaces from platform vendors (e.g., Google and Apple… Expand
Detection of Repackaged Smartphone Applications On Android
We are living in the post-PC era, where smartphones, tablets and other mobile devices have grabbed the market. These mobile devices accompany huge number of useful and feature-rich applications.Expand
Detection of repackaged Android applications based on Apps Permissions
  • O. Nisha, S. M. Bhanu
  • Computer Science
  • 2018 4th International Conference on Recent Advances in Information Technology (RAIT)
  • 2018
TLDR
A method is proposed to detect a repackaged application by using mutual information and chi square for selecting features and evaluating using random forest classifier, and the performance of the classifier is compared with SVM, NB, Decision Tree and KNN. Expand
Android Applications Repackaging Detection Techniques for Smartphone Devices
TLDR
This paper study in detail about some of the repackaging detection techniques which focus entirely on detecting repackaged apps. Expand
A Framework for Third Party Android Marketplaces to Identify Repackaged Apps
  • N. Lo, Shau-Kang Lu, Yo-Hsuan Chuang
  • Computer Science
  • 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
  • 2016
TLDR
A framework based on App fingerprint and whitelist/blacklist of Apps is proposed to evaluate the integrity of an App before it is released on the market in this paper and results have shown that the proposed framework detected 96% of repackaged Apps in average. Expand
Sweetening android lemon markets: measuring and combating malware in application marketplaces
TLDR
AppIntegrity strengthens the authentication properties offered in application marketplaces, thereby making it more difficult for miscreants to repackage apps, while presenting very little computational or communication overhead, and being deployable without requiring significant changes to the Android platform. Expand
Detecting Repackaged Android Applications
TLDR
An efficient repackaged apps detection scheme based on context-triggered piecewise hash (CTPH) is proposed and the similarity calculation method (edit distance) is optimized and filter unnecessary matching process to make the matching more efficient. Expand
The impact of vendor customizations on android security
TLDR
This paper analyzes stock Android images from five popular smartphone vendors to assess the extent of security issues that may be introduced from vendor customizations and further determine how the situation is evolving over time. Expand
RepDroid: An Automated Tool for Android Application Repackaging Detection
TLDR
This work proposes layout group graph (LGG) built from UI trances to model those UI behaviors and uses LGG as the birthmark of Android apps for identification and implements a dynamic repackaging detection tool, RepDroid. Expand
Systematic audit of third-party android phones
TLDR
A comparative approach to systematically audit software in third-party phones by comparing them side-by-side to the official system and designed and implemented DexDiff, a system that can pinpoint fine structural differences between two Android binaries and also present the changes in their surrounding contexts. Expand
A Survey of Android Security Threats and Defenses
TLDR
This survey discusses the existing Android security threats and existing security enforcements solutions between 2010−2015 and tries to classify works and review their functionalities and reviews the strength and weak points of the solutions. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 48 REFERENCES
Taming Information-Stealing Smartphone Applications (on Android)
TLDR
A system called TISSA is developed that implements a new privacy mode in smartphones that can empower users to flexibly control in a fine-grained manner what kinds of personal information will be accessible to an application. Expand
PiOS: Detecting Privacy Leaks in iOS Applications
TLDR
To protect its users from malicious applications, Apple has introduced a vetting process, which should ensure that all applications conform to Apple’s (privacy) rules before they can be offered via the App Store, but this vetting process is not welldocumented. Expand
On lightweight mobile phone application certification
TLDR
The Kirin security service for Android is proposed, which performs lightweight certification of applications to mitigate malware at install time and indicates that security configuration bundled with Android applications provides practical means of detecting malware. Expand
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
TLDR
A permissionbased behavioral footprinting scheme to detect new samples of known Android malware families and a heuristics-based filtering scheme to identify certain inherent behaviors of unknown malicious families are proposed. Expand
Analyzing inter-application communication in Android
TLDR
This work examines Android application interaction and identifies security risks in application components and provides a tool, ComDroid, that detects application communication vulnerabilities and found 34 exploitable vulnerabilities. Expand
Systematic Detection of Capability Leaks in Stock Android Smartphones
TLDR
This paper analyzes eight popular Android smartphones and discovers that the stock phone images do not properly enforce the permission model, leaving several privileged permissions unsafely exposed to other applications which do not need to request them for the actual use. Expand
A Study of Android Application Security
TLDR
A horizontal study of popular free Android applications uncovered pervasive use/misuse of personal/ phone identifiers, and deep penetration of advertising and analytics networks, but did not find evidence of malware or exploitable vulnerabilities in the studied applications. Expand
MockDroid: trading privacy for application functionality on smartphones
TLDR
MockDroid allows users to revoke access to particular resources at run-time, encouraging users to consider the trade-off between functionality and the disclosure of personal information whilst they use an application. Expand
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
TLDR
TaintDroid is an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data and enabling realtime analysis by leveraging Android’s virtualized execution environment. Expand
Android permissions demystified
TLDR
Stowaway, a tool that detects overprivilege in compiled Android applications, is built and finds that about one-third of applications are overprivileged. Expand
...
1
2
3
4
5
...