Title :
An efficient method of detecting repackaged android applications
Author :
Zhongyuan Qin ; Xinshuai Zhang ; Qunfang Zhang ; Zhongyun Yang
Author_Institution :
Sch. of Inf. Sci. & Eng., Southeast Univ., Nanjing, China
Abstract :
With the massive popularity of smartphones, many third-party marketplaces are emerged to meet smartphone users´ need. These third-party marketplaces usually provide thousands of applications, but can´t guarantee their security. Among the malicious applications, repackaging is one of the most common techniques to piggyback malicious payloads into legitimate applications. In order to keep the android ecosystem healthy, an app similarity measurement system is proposed to detect repackaged applications directly from the DEX file. We use the string length as the fingerprint to measure the similarity between third-party application and the original one, afterwards according to the similarity score whether one third-party application is repackaged or not can be determined. We perform a systematic study on five popular Android-based third-party marketplaces with randomly 200 samples from each third-party marketplace. Further manual investigation shows that these repackaged apps are mainly used to replace existing in-app advertisements or embed new ones to “steal” or re-route ad revenues. We also identify a few cases with planted malicious payloads among repackaged apps.
Keywords :
invasive software; mobile computing; smart phones; Android-based third party marketplace; DEX file; applications similarity measurement system; in-app advertisement; legitimate applications; malicious applications; piggyback malicious payloads; repackaged android applications detection; similarity score; smartphones; third party application; Android; DEX file; Repackaging;
Conference_Titel :
Cyberspace Technology (CCT 2014), International Conference on
Print_ISBN :
978-1-84919-928-5
DOI :
10.1049/cp.2014.1331