Abstract | ||
---|---|---|
Nowadays the security issues of Android applications (apps) are more and more serious. One of the main security threats come from repackaged apps. There already are some researches detecting repackaged apps using similarity measurement. However, so far, all the existing techniques for repackaging detection are based on code similarity or feature (e.g., permission set) similarity evaluation. In this paper, we propose a novel approach called ImageStruct that applies image similarity technique to locate and detect the changes coming from repackaging effectively. ImageStruct performs a quick repackaging detection by considering the similarity of images in target apps. The intuition behind our approach is that the repackaged apps still need to maintain the "look and feel" of the original apps by including the original images, even they might have their additional code included or some of the original code removed. To prove the effectiveness and evaluate the reliability of our approach, we carry out the compare experiments between ImageStruct and the code based similarity scores of AndroGuard. The results demonstrate that ImageStruct is not only with good performance and scalability, but also able to resistant to code obfuscation. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/978-3-319-17533-1_24 | INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015 |
Keywords | Field | DocType |
Android Malware, Repackaged Application Detection, Image Similarity | Permission,Android (operating system),Look and feel,Computer security,Repackaging,Computer science,Intuition,Android malware,Obfuscation (software),Scalability | Conference |
Volume | ISSN | Citations |
9065 | 0302-9743 | 3 |
PageRank | References | Authors |
0.39 | 9 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sibei Jiao | 1 | 15 | 1.10 |
Yao Cheng | 2 | 36 | 6.21 |
Lingyun Ying | 3 | 10 | 2.32 |
Purui Su | 4 | 94 | 13.71 |
Deng-Guo Feng | 5 | 1991 | 190.95 |