Abstract | ||
---|---|---|
Android apps often include libraries supporting certain features, or allowing rapid app development. Due to Android's system design, libraries are not easily distinguishable from the app's core code. But detecting libraries in apps is needed especially in app analysis, e.g., to determine if functionality is executed in the app, or in the code of the library.Previous approaches detected libraries in ways which are susceptible to code obfuscation. For some approaches, even simple obfuscation will cause unrecognised libraries.Our approach - Ordol - builds upon approaches from plagiarism detection to detect a specific library version inside an app in an obfuscation-resilient manner. We show that Ordol can cope well with obfuscated code and can be easily applied to real life apps. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1109/Trustcom/BigDataSE/ICESS.2017.292 | 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS |
Field | DocType | ISSN |
World Wide Web,Android (operating system),Plagiarism detection,Computer security,Computer science,Systems design,Robustness (computer science),Obfuscation (software),Obfuscation | Conference | 2324-9013 |
Citations | PageRank | References |
0 | 0.34 | 10 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Dennis Titze | 1 | 18 | 3.46 |
Michael Lux | 2 | 0 | 0.34 |
Julian Schütte | 3 | 58 | 14.61 |