DocumentCode
732079
Title
Detecting Clones in Android Applications through Analyzing User Interfaces
Author
Soh, Charlie ; Tan, Hee Beng Kuan ; Arnatovich, Yauhen Leanidavich ; Wang, Lipo
fYear
2015
fDate
18-19 May 2015
Firstpage
163
Lastpage
173
Abstract
The blooming mobile smart phone device industry has attracted a large number of application developers. However, due to the availability of reverse engineering tools for Android applications, it also caught the attention of plagiarists and malware writers. In recent years, application cloning has become a serious threat to the Android market. In previous work, mobile application clone detection mainly focuses on code-based analysis. Such an approach lacks resilient to advanced obfuscation techniques. Their efficiency is also questionable, as billions of opcodes need to be processed for cross-market clone detection. In this paper, we propose a novel technique of detecting Android application clones based on the analysis of user interface (UI) information collected at runtime. By leveraging on the multiple entry points feature of Android applications, the UI information can be collected easily without the need to generate relevant inputs and execute the entire application. Another advantage of our technique is obfuscation resilient since semantics preserving obfuscation technique do not affect runtime behaviors. We evaluated our approach on a set of real-world dataset and it has a low false positive rate and false negative rate. Furthermore, the results also show that our approach is effective in detecting different types of repackaging attacks.
Keywords
Androids; Cloning; Humanoid robots; Runtime; Smart phones; Software; XML; Android; Clone detection; Obfuscation resilient; Repackaging; User interface;
fLanguage
English
Publisher
ieee
Conference_Titel
Program Comprehension (ICPC), 2015 IEEE 23rd International Conference on
Conference_Location
Florence, Italy
Type
conf
DOI
10.1109/ICPC.2015.25
Filename
7181443
Link To Document