File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-642-33167-1_3
- Scopus: eid_2-s2.0-84865590234
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Attack of the clones: Detecting cloned applications on Android markets
Title | Attack of the clones: Detecting cloned applications on Android markets |
---|---|
Authors | |
Issue Date | 2012 |
Citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, v. 7459 LNCS, p. 37-54 How to Cite? |
Abstract | We present DNADroid, a tool that detects Android application copying, or "cloning", by robustly computing the similarity between two applications. DNADroid achieves this by comparing program dependency graphs between methods in candidate applications. Using DNADroid, we found at least 141 applications that have been the victims of cloning, some as many as seven times. DNADroid has a very low false positive rate - we manually confirmed that all the applications detected are indeed clones by either visual or behavioral similarity. We present several case studies that give insight into why applications are cloned, including localization and redirecting ad revenue. We describe a case of malware being added to an application and show how DNADroid was able to detect two variants of the same malware. Lastly, we offer examples of an open source cracking tool being used in the wild. © 2012 Springer-Verlag. |
Persistent Identifier | http://hdl.handle.net/10722/346572 |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Crussell, Jonathan | - |
dc.contributor.author | Gibler, Clint | - |
dc.contributor.author | Chen, Hao | - |
dc.date.accessioned | 2024-09-17T04:11:46Z | - |
dc.date.available | 2024-09-17T04:11:46Z | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, v. 7459 LNCS, p. 37-54 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346572 | - |
dc.description.abstract | We present DNADroid, a tool that detects Android application copying, or "cloning", by robustly computing the similarity between two applications. DNADroid achieves this by comparing program dependency graphs between methods in candidate applications. Using DNADroid, we found at least 141 applications that have been the victims of cloning, some as many as seven times. DNADroid has a very low false positive rate - we manually confirmed that all the applications detected are indeed clones by either visual or behavioral similarity. We present several case studies that give insight into why applications are cloned, including localization and redirecting ad revenue. We describe a case of malware being added to an application and show how DNADroid was able to detect two variants of the same malware. Lastly, we offer examples of an open source cracking tool being used in the wild. © 2012 Springer-Verlag. | - |
dc.language | eng | - |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.title | Attack of the clones: Detecting cloned applications on Android markets | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-642-33167-1_3 | - |
dc.identifier.scopus | eid_2-s2.0-84865590234 | - |
dc.identifier.volume | 7459 LNCS | - |
dc.identifier.spage | 37 | - |
dc.identifier.epage | 54 | - |
dc.identifier.eissn | 1611-3349 | - |