Evaluation of Resource-Based App Repackaging Detection in Android
نویسندگان
چکیده
Android app repackaging threatens the health of application markets, as repackaged apps, besides stealing revenue for honest developers, are also a source of malware distribution. Techniques that rely on visual similarity of Android apps recently emerged as a way to tackle the repackaging detection problem, as code-based detection techniques often fail in terms of efficiency, and effectiveness when obfuscation is applied [19,21]. Among such techniques, the resource-based repackaging detection approach that compares sets of files included in apks has arguably the best performance [20,17,10]. Yet, this approach has not been previously validated on a dataset of repackaged apps. In this paper we report on our evaluation of the approach, and present substantial improvements to it. Our experiments show that the stateof-art tools applying this technique rely on too restrictive thresholds. Indeed, we demonstrate that a very low proportion of identical resource files in two apps is a reliable evidence for repackaging. Furthermore, we have shown that the Overlap similarity score performs better than the Jaccard similarity coefficient used in previous works. By applying machine learning techniques, we give evidence that considering separately the included resource file types significantly improves the detection accuracy of the method. Experimenting with a balanced dataset of more than 2700 app pairs, we show that with our enhancements it is possible to achieve the F-measure of 0.9919.
منابع مشابه
A Framework for Evaluating Mobile App Repackaging Detection Algorithms
Because it is not hard to reverse engineer the Dalvik bytecode used in the Dalvik virtual machine, Android application repackaging has become a serious problem. With repackaging, a plagiarist can simply steal others’ code violating the intellectual property of the developers. More seriously, after repackaging, popular apps can become the carriers of malware, adware or spy-ware for wide spreadin...
متن کاملSemantics-Based Repackaging Detection for Mobile Apps
While Android app stores keep growing in size and in number, app repackaging has become a major threat to the health of the mobile ecosystem. Different from many syntax-based repackaging detection techniques, in this work we propose a semantic-based approach, RepDetector, which is more robust against code obfuscation attacks. To capture an app’s semantics, our approach extracts input-output sta...
متن کاملDetection of Repackaged Android Malware with Code-Heterogeneity Features
During repackaging, malware writers statically inject malcode and modify the control flow to ensure its execution. Repackaged malware is difficult to detect by existing classification techniques, partly because of their behavioral similarities to benign apps. By exploring the app’s internal different behaviors, we propose a new Android repackaged malware detection technique based on code hetero...
متن کاملFSquaDRA: Fast Detection of Repackaged Applications
The ease of Android applications repackaging and proliferation of application clones in Google Play and other markets call for new effective techniques to detect repackaged code and combat distribution of cloned applications. Today all existing techniques for repackaging detection are based on code similarity or feature (e.g., permission set) similarity evaluation. We propose a new approach to ...
متن کاملAn Android Application for Estimating Muscle Onset Latency using Surface EMG Signal
Background: Electromyography (EMG) signal processing and Muscle Onset Latency (MOL) are widely used in rehabilitation sciences and nerve conduction studies. The majority of existing software packages provided for estimating MOL via analyzing EMG signal are computerized, desktop based and not portable; therefore, experiments and signal analyzes using them should be completed locally. Moreover, a...
متن کامل