skip to main content
10.1145/2484417.2484419acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
keynote

Underground economy of android application plagiarism

Published: 08 May 2013 Publication History

Abstract

As Android became the most popular mobile operating system, malicious activities targeting Android and its applications are rising rapidly. While technical approaches may mitigate the attacks with varying effectiveness, understanding the economic incentives of the criminals may shed light on the most effective defense. In this talk, I will focus on application plagiarism on Android markets. First, I will describe the unique characteristics of android applications, the fundamental differences between plagiarism of Android applications and that of non-mobile software, and the relationship between plagiarism and mobile advertising. Next, I will illustrate the challenges in measuring the scale, severity, and impact of Android application plagiarism. To achieve this, we need not only detect plagiarism among the large number of applications on different Android markets but also measure their usage and impact on advertising on a large, live network. I will describe how we correlated plagiarized applications detected through static analysis to their advertising traffic captured on a live network. I will characterize properties of the cloned applications, including their distribution across different markets, application categories, and advertising libraries. To examine how plagiarized applications affect the original developers, I will estimate on the advertising revenue and user base that plagiarized applications have siphoned from the original developers. Finally, I will discuss defenses against application plagiarism.

Cited By

View all
  • (2016)Dissecting developer policy violating apps: characterization and detection2016 11th International Conference on Malicious and Unwanted Software (MALWARE)10.1109/MALWARE.2016.7888725(1-10)Online publication date: Oct-2016
  • (2015)Detecting Camouflaged Applications on Mobile Application MarketsInformation Security and Cryptology - ICISC 201410.1007/978-3-319-15943-0_15(241-254)Online publication date: 17-Mar-2015
  • (2014)AndRadar: Fast Discovery of Android Applications in Alternative MarketsDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-319-08509-8_4(51-71)Online publication date: 2014

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SESP '13: Proceedings of the first international workshop on Security in embedded systems and smartphones
May 2013
34 pages
ISBN:9781450320689
DOI:10.1145/2484417

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 May 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. advertising
  2. android
  3. applications
  4. mobile
  5. plagiarism

Qualifiers

  • Keynote

Conference

ASIA CCS '13
Sponsor:

Acceptance Rates

SESP '13 Paper Acceptance Rate 3 of 6 submissions, 50%;
Overall Acceptance Rate 3 of 6 submissions, 50%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2016)Dissecting developer policy violating apps: characterization and detection2016 11th International Conference on Malicious and Unwanted Software (MALWARE)10.1109/MALWARE.2016.7888725(1-10)Online publication date: Oct-2016
  • (2015)Detecting Camouflaged Applications on Mobile Application MarketsInformation Security and Cryptology - ICISC 201410.1007/978-3-319-15943-0_15(241-254)Online publication date: 17-Mar-2015
  • (2014)AndRadar: Fast Discovery of Android Applications in Alternative MarketsDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-319-08509-8_4(51-71)Online publication date: 2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media