Skip to main content

A Scalable Cloud-Based Android App Repackaging Detection Framework

  • Conference paper
  • First Online:
Green, Pervasive, and Cloud Computing

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9663))

Abstract

The problem of app repackaging has become a huge threat to the security of Android ecosystem. The massive amount of existing and developing apps makes a high demand on scalability of app repackaging detectors. In this paper, we propose a cloud-based app repackaging detection framework. It is designed to analyze and detect repacked Android apps in a large-scale way. The framework consists of three primary components: market monitor, app feature extractor and app similarity computer. Market monitor crawls all new and updated apps in specific alternative app markets periodically. Then, the multi-level features of apps are extracted by app feature extractor. App similarity computer computes the similarity score of two apps based on these features. A prototype system is implemented. The evaluation results demonstrate that the proposed cloud-based framework is highly scalable and effective for large-scale Android app repackaging detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Apple App Store, December 2015. https://itunes.apple.com/us/genre/ios/

  2. Google Play, December 2015. https://play.google.com/store/

  3. Smali, December 2015. https://github.com/JesusFreke/smali/

  4. Aliyun, December 2015. http://www.aliyun.com/

  5. Redis, December 2015. http://redis.io/

  6. Celery, December 2015. http://www.celeryproject.org/

  7. Scrapy, December 2015. http://scrapy.org/

  8. Docker, December 2015. http://docker.com/

  9. Aliyun Container Service, December 2015. http://www.aliyun.com/product/containerservice/

  10. Aliyun ECS, December 2015. http://www.aliyun.com/product/ecs/

  11. Aliyun OSS, December 2015. http://www.aliyun.com/product/oss/

  12. Androguard December 2015. https://github.com/androguard/androguardd

  13. Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party Android marketplaces. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 317–326. ACM (2012)

    Google Scholar 

  14. Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., van der Veen, V., Platzer, C.: ANDRUBIS-1,000,000 apps later: a view on current Android malware behaviors. In: Proceedings of 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS) (2014)

    Google Scholar 

  15. Lindorfer, M., et al.: AndRadar: fast discovery of Android applications in alternative markets. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 51–71. Springer, Heidelberg (2014)

    Google Scholar 

  16. Crussell, J., Gibler, C., Chen, H.: Attack of the clones: detecting cloned applications on Android markets. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 37–54. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  17. Zhou, W., Zhou, Y., Grace, M., Jiang, X., Zou, S.: Fast, scalable detection of “Piggybacked” mobile applications. In: Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 185–196. ACM (2013)

    Google Scholar 

  18. Zhang, F., Huang, H., Zhu, S., Wu, D., Liu, P.: ViewDroid: towards obfuscation-resilient mobile application repackaging detection. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), pp. 25–36. ACM (2014)

    Google Scholar 

  19. Zhou, W., Wang, Z., Zhou, Y., Jiang, X.: DIVILAR: diversifying intermediate language for anti-repackaging on Android platform. In: Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 199–210. ACM (2014)

    Google Scholar 

  20. Sun, X., Zhongyang, Y., Xin, Z., Mao, B., Xie, L.: Detecting code reuse in Android applications using component-based control flow graph. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Kalam, A.A.E., Sans, T. (eds.) SEC 2014. IFIP AICT, vol. 428, pp. 142–155. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  21. Huang, H., Zhu, S., Liu, P., Wu, D.: A framework for evaluating mobile app repackaging detection algorithms. In: Huth, M., Asokan, N., Čapkun, S., Flechais, I., Coles-Kemp, L. (eds.) TRUST 2013. LNCS, vol. 7904, pp. 169–186. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinghua Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, J., Liu, X., Zhang, H., Mu, D. (2016). A Scalable Cloud-Based Android App Repackaging Detection Framework. In: Huang, X., Xiang, Y., Li, KC. (eds) Green, Pervasive, and Cloud Computing. Lecture Notes in Computer Science(), vol 9663. Springer, Cham. https://doi.org/10.1007/978-3-319-39077-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-39077-2_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-39076-5

  • Online ISBN: 978-3-319-39077-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics