Filters








401 Hits in 7.8 sec

Robust App Clone Detection Based on Similarity of UI Structure

Yangyu Hu, Guosheng Xu, Bowen Zhang, Kun Lai, Guoai Xu, Miao Zhang
2020 IEEE Access  
In this paper, we propose a robust app clone detection method based on the similarity of UI structure.  ...  App clone detection has received extensive attentions from our research community, and a number of approaches were proposed, which mainly rely on code or visual similarity of the apps.  ...  To address these limitations, we propose a new approach to detect app clone based on the similarity of UI structure.  ... 
doi:10.1109/access.2020.2988400 fatcat:mio6koia2jcfzmn4jbxqppwthe

AnDarwin: Scalable Detection of Android Application Clones Based on Semantics

Jonathan Crussell, Clint Gibler, Hao Chen
2015 IEEE Transactions on Mobile Computing  
We present a scalable approach to detecting similar Android apps based on their semantic information.  ...  In 10 hours, AnDarwin detected at least 4,295 apps that are the victims of cloning and 36,106 rebranded apps.  ...  Finally, they would like to thanks Sam Dawson for his work to manually investigate app similarity.  ... 
doi:10.1109/tmc.2014.2381212 fatcat:rfofiej2mvahnhplcexskhu7u4

Detecting Low Rating Android Apps Before They Have Reached the Market [article]

Ding Li, Dongjin Song
2017 arXiv   pre-print
., Sextant , to detect low rating Android apps based on the .apk files.With our proposed technique, an Android app market can prevent from risking its reputation on exposing low rating apps to users.  ...  In this way, however, the reputation of the app market has already been damaged.  ...  Chen and colleagues embeds CFG of programs as a matrix [21] to detect program clones. Unlike Sextant , these approaches focus on detecting program clones.  ... 
arXiv:1712.05843v1 fatcat:oa7mhmrwg5f7ndneiiwbbepfcq

Attack of the Clones: Detecting Cloned Applications on Android Markets [chapter]

Jonathan Crussell, Clint Gibler, Hao Chen
2012 Lecture Notes in Computer Science  
We present DNADroid, a tool that detects Android application copying, or "cloning", by robustly computing the similarity between two applications.  ...  DNADroid has a very low false positive rate -we manually confirmed that all the applications detected are indeed clones by either visual or behavioral similarity.  ...  This paper is partially based upon work supported by the National Science Foundation (NSF) under Grant No. 0644450 and 1018964.  ... 
doi:10.1007/978-3-642-33167-1_3 fatcat:puhscgetpncajpu5qdjwjbpfku

Fragment-Based Test Generation For Web Apps [article]

Rahulkrishna Yandrapally, Ali Mesbah
2021 arXiv   pre-print
100% success rate on the same version of the web app even if the execution environment is varied.  ...  The test oracles generated by FRAGGEN can detect 98.7% of the visible changes in web pages while being highly tolerant to web app dynamism, making them suitable for regression testing.  ...  Test Generation UI Test cases, such as the one shown in Listing 1, are sequences of UI events derived from inferred web app models as discussed in section 2.  ... 
arXiv:2110.14043v1 fatcat:d2pmvsloabatbbalsfll4l75n4

Towards a scalable resource-driven approach for detecting repackaged Android applications

Yuru Shao, Xiapu Luo, Chenxiong Qian, Pengfei Zhu, Lei Zhang
2014 Proceedings of the 30th Annual Computer Security Applications Conference on - ACSAC '14  
More precisely, we define new features for characterizing apps, investigate two kinds of algorithms for searching similar apps, and propose a two-stage methodology to speed up the detection.  ...  Repackaged Android applications (or simply apps) are one of the major sources of mobile malware and also an important cause of severe revenue loss to app developers.  ...  We propose a novel approach that leverages new features extracted from core resources and codes to detect repackaged apps.  ... 
doi:10.1145/2664243.2664275 dblp:conf/acsac/ShaoLQZ014 fatcat:hjzmrmqi2za7foeqpenu2u55ou

CodeMatch: obfuscation won't conceal your repackaged app

Leonid Glanz, Sven Amann, Michael Eichberg, Michael Reif, Ben Hermann, Johannes Lerch, Mira Mezini
2017 Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2017  
Therefore, two apps, where the obfuscated code bases are very similar, do not have to be repackages of each other.  ...  To reliably detect repackaged apps, we propose a two step approach which first focuses on the identification and removal of the library code in obfuscated apps.  ...  App makers generate apps by processing user created ui designs. Apps generated by the same App maker generally share a similar code base without necessarily being repackages.  ... 
doi:10.1145/3106237.3106305 dblp:conf/sigsoft/GlanzAERHLM17 fatcat:dnjfenp7zza33pqbs2y7am66y4

Android Security using NLP Techniques: A Review [article]

Sevil Sen, Burcu Can
2021 arXiv   pre-print
We mainly focus on NLP-based solutions under four categories: description-to-behaviour fidelity, description generation, privacy and malware detection.  ...  Especially, security solutions based on NLP have accelerated in the last 5 years and proven to be useful.  ...  Acknowledgements This study is supported by the Scientific and Technological Research Council of Turkey (TUBITAK-118E141). The authors would like to thank TUBITAK for its support.  ... 
arXiv:2107.03072v1 fatcat:yo3qc3w5jbhu7kb6db76hq2d2e

DroidEagle

Mingshen Sun, Mengmeng Li, John C. S. Lui
2015 Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks - WiSec '15  
To detect visually similar apps, we design and implement DroidEagle which consists of two sub-systems: RepoEagle and HostEagle.  ...  RepoEagle is to perform large scale detection on apps repositories (e.g., apps markets), and HostEagle is a lightweight mobile app which can help users to quickly detect visually similar Android app upon  ...  The feature view graph is based on the calling relations between user interfaces (UI). However, phishing malware tend to utilize part of privacy sensitive UIs (e.g., login UIs) to cheat users.  ... 
doi:10.1145/2766498.2766508 dblp:conf/wisec/SunLL15 fatcat:od2ezwv6wfdofmur7sowckthta

An Innovative Security Strategy using Reactive Web Application Honeypot

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Nowadays, web applications have become most prevailing in the industry, and the critical data of most organizations are stored using web apps.  ...  As mitigation for them, among many proposed solutions, web application honeypots are much sophisticated and robust protection.  ...  Similar to the other emulators Base emulator uses Get Emulation Results method, which first scans the payload through all the emulators to detect the possible vulnerability of the highest order.  ... 
doi:10.35940/ijitee.e2957.039520 fatcat:ngbmcpzjgrhw5np3go67xzb4xy

ViewDroid

Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu, Peng Liu
2014 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks - WiSec '14  
In this paper, we propose ViewDroid, a user interface based approach to mobile app repackaging detection.  ...  ViewDroid can detect repackaged apps at a large scale, both effectively and efficiently. Our experiments also show that the false positive and false negative rates of ViewDroid are both very low.  ...  ViewDroid: We propose ViewDroid, an Android app repackaging detection system based on view graph. ViewDroid is robust to many code obfuscation tech-niques, and both efficient and scalable.  ... 
doi:10.1145/2627393.2627395 dblp:conf/wisec/ZhangHZW014 fatcat:322o2api4fcabdbuh57sw24p5y

Machine Learning-Based Routing and Wavelength Assignment in Software-Defined Optical Networks

Ignacio Martin, Sebastian Troia, Jose Alberto Hernandez, Alberto Rodriguez, Francesco Musumeci, Guido Maier, Rodolfo Alvizu, Oscar Gonzalez de Dios
2019 IEEE Transactions on Network and Service Management  
Guan et al [47] propose targeting the input/output symbolic representations of each app to detect clones based on semantic similarities.  ...  Hence, we performed visual inspection over the latter 29, finding 17 to look very much like clones attending to similarities in UIs, application structures, sizes and permissions.  ... 
doi:10.1109/tnsm.2019.2927867 fatcat:or3lhqdqbnas3cztwkqr5ykhhq

Research on Third-Party Libraries in AndroidApps: A Taxonomy and Systematic LiteratureReview [article]

Xian Zhan, Tianming Liu, Lingling Fan, Li Li, Sen Chen, Xiapu Luo, Yang Liu
2021 arXiv   pre-print
On the one hand, it can ease the development of mobile apps.  ...  Although there are already many studies for characterizing third-party libraries, including automated detection, security and privacy analysis of TPLs, TPL attributes analysis, etc., what strikes us odd  ...  After that, they removed other UI states and kept the ad-related UI states based on the UI type features, UI location features, and strings. Finally, they performed a violation detection.  ... 
arXiv:2108.03787v1 fatcat:jnj4kvlkuzg3hbgy4pl5wpvle4

A Systematic Assessment on Android Third-party Library Detection Tools [article]

Xian Zhan, Tianming Liu, Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo
2021 arXiv   pre-print
To this end, we conduct a comprehensive empirical study to fill the gap by evaluating and comparing all publicly available TPL detection tools based on six criteria: accuracy of TPL construction, effectiveness  ...  Third-party libraries (TPLs) have become a significant part of the Android ecosystem. Developers can employ various TPLs to facilitate their app development.  ...  The detection rate of clustering-based methods primarily relies on the number of collected apps and the reuse rate of in-app TPLs.  ... 
arXiv:2108.01964v1 fatcat:k6eikny5c5hxhjtl6he2hc2tm4

A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps [article]

Wei Wang and Guozhu Meng and Haoyu Wang and Kai Chen and Weimin Ge and Xiaohong Li
2020 arXiv   pre-print
Based on that, we generate fingerprints for an author from its developed Android apps and employ several machine learning algorithms for authorship classification.  ...  Additionally, we test it on 2,900 obfuscated apps and our approach can classify apps with an accuracy rate of 80.4%.  ...  This work has partially been sponsored by the National Natural Science Foundation of China (No. 61872262, 61702045, 61572349, 61902395, and U1836211) and National Key R&D Programmes of China (No. 2019AAA0104301  ... 
arXiv:2008.13768v1 fatcat:swizvidm7nh2bkii3cdotoo6oy
« Previous Showing results 1 — 15 out of 401 results