Detecting repackaged apps is one of the important issues in the Android ecosystem. Many attackers usually reverse engineer a legitimate app, modify or embed malicious codes into the app, repackage and distribute it in the online markets. They also employ code obfuscation techniques to hide app cloning or repackaging. In this paper, we propose a new technique for detecting repackaged Android apps, which is robust to code obfuscation. The technique analyzes the similarity of Android apps based on the method call information of component classes that receive implicit intents. We developed a tool Calldroid that implemented the proposed technique, and evaluated it on apps transformed using well-known obfuscators. The evaluation results showed that the proposed technique can effectively detect repackaged apps.
A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information
Byoung-chir Kim,Jaemin Jung,Sangchul Han,Soyeon Jeon,Seong-je Cho,Jongmoo Choi
Published 2019 in International Conference on Ubiquitous and Future Networks
ABSTRACT
PUBLICATION RECORD
- Publication year
2019
- Venue
International Conference on Ubiquitous and Future Networks
- Publication date
2019-07-01
- Fields of study
Computer Science
- Identifiers
- External record
- Source metadata
Semantic Scholar
CITATION MAP
EXTRACTION MAP
CLAIMS
- No claims are published for this paper.
CONCEPTS
- No concepts are published for this paper.
REFERENCES
Showing 1-14 of 14 references · Page 1 of 1
CITED BY
Showing 1-5 of 5 citing papers · Page 1 of 1