skip to main content
10.1145/3019612.3019926acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
abstract

On computing similarity of android executables using text mining: student research abstract

Published:03 April 2017Publication History

ABSTRACT

According to Comscore1, Android users in the U.S spend an average of 2.8 hours per day using mobile media. On the other hand, according to Statista reports2, Android users were able to choose between 2.2 million applications on June 2016. Among these applications, there are ones reported by Google Android Security Service3 as malware, virus, or illegal theft. Many tools such as Dex2Jar4, apktool5, and jd-gui6 analyze and reverse engineer Android applications and can be used to illegally copy or transform the applications as well. In order to protect applications from piracy or illegal theft, it is necessary to detect theft by measuring application similarity. In the literature, previous studies on theft detection have measured application similarity at two levels, source or executable code level, which have some limitations. Source codes are not available if the codes are legacy one or are developed by upstream suppliers. In the case of the executable codes, application similarity is measured 1) using the source codes decompiled from the executables, or 2) using the characteristics extracted from the executables (i.e., birthmark). For example, DroidMoss [5] applied a fuzzy hashing technique to effectively localize and detect the changes from app-repackaging behavior. Reference [4] proposed software birthmarks to show the unique characteristics of a program and detected software theft based on the birthmarks.

References

  1. Bowyer, K. W., and Hall, L. O. Experience using MOSS to detect cheating on programming assignments, IEEE FIE pp. 13B3/18--13B3/22 vol. 3, 1999Google ScholarGoogle Scholar
  2. Hamedani, M. R., Lee, S., and Kim, S. On Combining Text-based and Link-based Similarity Measures for Scientific Papers, ACM RACS, pp. 111--115, 2013 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. RAMOS, Juan. Using tf-idf to determine word relevance in document queries, ICML, 2003Google ScholarGoogle Scholar
  4. Tamada, H., Nakamura, M., and Monden, A. Design and Evaluation of Birthmarks for Detecting Theft of Java Programs, IASTED, pp. 569--574, 2004Google ScholarGoogle Scholar
  5. Zhou, W., Zhou, Y., Jiang, X., and Ning, P. Detecting repackaged smartphone applications in third-party android marketplaces, ACM CODASPY, pp. 317--326, 2012 Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SAC '17: Proceedings of the Symposium on Applied Computing
    April 2017
    2004 pages
    ISBN:9781450344869
    DOI:10.1145/3019612

    Copyright © 2017 Owner/Author

    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 3 April 2017

    Check for updates

    Qualifiers

    • abstract

    Acceptance Rates

    Overall Acceptance Rate1,650of6,669submissions,25%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader