Corpus ID: 53382022

DroidSD: An Efficient Indexed Based Android Applications Similarity Detection Tool

@article{Akram2020DroidSDAE,
  title={DroidSD: An Efficient Indexed Based Android Applications Similarity Detection Tool},
  author={Junaid Akram and Zhendong Shi and Majid Mumtaz and Ping Luo},
  journal={J. Inf. Sci. Eng.},
  year={2020},
  volume={36},
  pages={13-29}
}
Android is becoming more and more popular in recent years. Meanwhile, it has been noticed that the security threats are also increasing with the passage of time. Most of the threats come by copying and pasting other applications code without knowing and evaluating it. Similar code fragments (clones) in Android applications make it very difficult to maintain these security flaws. To overcome these security problems, it is very important to discover, identify, retrieve, evaluate and recover these… Expand
ASAF: Android Static Analysis Framework
TLDR
An Android Static Analysis Framework (ASAF) is presented which models the overall static analysis phases and approaches for Android applications and utilizes a parsing tool, Android Static Parse (ASParse) which is introduced in this paper. Expand

References

SHOWING 1-10 OF 40 REFERENCES
Detecting Clones in Android Applications through Analyzing User Interfaces
TLDR
This paper proposes a novel technique of detecting Android application clones based on the analysis of user interface (UI) information collected at runtime that has a low false positive rate and false negative rate and is obfuscation resilient. Expand
AnDarwin: Scalable Detection of Android Application Clones Based on Semantics
TLDR
A scalable approach to detecting similar Android apps based on their semantic information called AnDarwin, which can detect both full and partial app similarity and automatically detect library code and remove it from the similarity analysis. Expand
Detecting software vulnerabilities in android using static analysis
  • R. Dhaya, M. Poongodi
  • Computer Science
  • 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies
  • 2014
TLDR
The proposed system aims to motivate static code analysis based malware detection using search based machine learning algorithm which is called N-gram analysis and it detects the unnoticed malicious characteristics or vulnerabilities in the mobile applications. Expand
Clone analysis and detection in android applications
TLDR
This paper performs a systematic analysis in Android applications of the difference of obfuscated and not obfuscated applications by Androguard, and presents the application of image processing technology in the similarity detection. Expand
Detecting Android Malware Using Clone Detection
TLDR
The results show that using a small portion of malicious applications as a training set can detect 95% of previously known malware with very low false positives and high accuracy at 96.88%. Expand
Achieving accuracy and scalability simultaneously in detecting application clones on Android markets
TLDR
The implemented app clone detection system uses a geometry characteristic of dependency graphs to measure the similarity between methods in two apps, and synthesizes the method-level similarities and draws a Y/N conclusion on app (core functionality) cloning. Expand
DroidNative: Automating and optimizing detection of Android native code malware variants
TLDR
DroidNative is the first system that builds cross-platform (x86 and ARM) semantic-based signatures at the Android native code level, allowing the system to detect malware embedded in either bytecode or native code. Expand
Dissecting Android Malware: Characterization and Evolution
TLDR
Systematize or characterize existing Android malware from various aspects, including their installation methods, activation mechanisms as well as the nature of carried malicious payloads reveal that they are evolving rapidly to circumvent the detection from existing mobile anti-virus software. Expand
Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications
TLDR
Juxtapp is proposed, a scalable infrastructure for code similarity analysis among Android applications that provides a key solution to a number of problems in Android security, including determining if apps contain copies of buggy code, have significant code reuse that indicates piracy, or are instances of known malware. Expand
Scalable code clone detection and search based on adaptive prefix filtering
TLDR
This paper focuses on improving the scalability of code clone detection, relative to current state of the art techniques, and develops an adaptive prefix filtering technique that improves the performance of codeclone detection for many common execution parameters, when tested on common benchmarks. Expand
...
1
2
3
4
...