loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: L. Vollero 1 ; D. Biondo 2 ; R. Setola 1 ; G. Bocci 2 ; R. Mammoliti 2 and A. Toma 2

Affiliations: 1 Università Campus Bio-Medico di Roma, Italy ; 2 Sistemi Informativi, Sicurezza Informatica, Incident Prevention and Management and Poste Italiane, Italy

Keyword(s): Security, Logo Analysis, Image Processing, Classification.

Abstract: The wide diffusion of mobile devices and the ability of users to customize their experience through applications (Apps) is opening to new problems related to privacy, security and data integrity for the mobile ecosystem. Smartphones, in general, and Android devices, in particular, are rapidly becoming emerging threat vectors of cybercrime activities. Unofficial Android markets, especially those with weak controls on published Apps, are the places where frauds may easily start and spread. Hence, the ability to identify and quickly shut down deceptive Apps is of paramount importance in the protection of users, services and infrastructures. Traditional approaches that aim at mitigating the presence of malicious Apps in unofficial markets, are based on crawlers for scanning stores and checking the words used in Apps’ description. These methods works very well when the App’s title, keywords and description match specific patterns that identify services to protect and the application owner or App’s signature do not match expected ones. Unluckily, the performance of such methods reduce sharply when the store adopts a language that is not supported by the recognition system or the App publisher uses misleading words in the App’s description. Nevertheless, App publishers always use a logo which is familiar to the user in order to highlight the application and increase the probability that the users install it. In this paper we presents a system that overcomes the limitation of traditional approaches including logo analysis in the process of App recognition. Our contribution is the definition and evaluation of a logo-based complementary system to be used in conjunction with traditional approaches based on word lists checking. The system and the performance of the proposed solution are presented and analyzed in the paper. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.145.186.6

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Vollero, L.; Biondo, D.; Setola, R.; Bocci, G.; Mammoliti, R. and Toma, A. (2017). Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-209-7; ISSN 2184-4356, SciTePress, pages 567-572. DOI: 10.5220/0006270305670572

@conference{icissp17,
author={L. Vollero. and D. Biondo. and R. Setola. and G. Bocci. and R. Mammoliti. and A. Toma.},
title={Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP},
year={2017},
pages={567-572},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006270305670572},
isbn={978-989-758-209-7},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP
TI - Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis
SN - 978-989-758-209-7
IS - 2184-4356
AU - Vollero, L.
AU - Biondo, D.
AU - Setola, R.
AU - Bocci, G.
AU - Mammoliti, R.
AU - Toma, A.
PY - 2017
SP - 567
EP - 572
DO - 10.5220/0006270305670572
PB - SciTePress