|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
APPraiser: A Large Scale Analysis of Android Clone Apps
Yuta ISHII Takuya WATANABE Mitsuaki AKIYAMA Tatsuya MORI
Publication
IEICE TRANSACTIONS on Information and Systems
Vol.E100-D
No.8
pp.1703-1713 Publication Date: 2017/08/01 Publicized: 2017/05/18 Online ISSN: 1745-1361
DOI: 10.1587/transinf.2016ICP0012 Type of Manuscript: Special Section PAPER (Special Section on Information and Communication System Security) Category: Program Analysis Keyword: mobile security, Android, repackaging, large-scale data,
Full Text: PDF(1.3MB)>>
Summary:
Android is one of the most popular mobile device platforms. However, since Android apps can be disassembled easily, attackers inject additional advertisements or malicious codes to the original apps and redistribute them. There are a non-negligible number of such repackaged apps. We generally call those malicious repackaged apps “clones.” However, there are apps that are not clones but are similar to each other. We call such apps “relatives.” In this work, we developed a framework called APPraiser that extracts similar apps and classifies them into clones and relatives from the large dataset. We used the APPraiser framework to study over 1.3 million apps collected from both official and third-party marketplaces. Our extensive analysis revealed the following findings: In the official marketplace, 79% of similar apps were attributed to relatives, while in the third-party marketplace, 50% of similar apps were attributed to clones. The majority of relatives are apps developed by prolific developers in both marketplaces. We also found that in the third-party market, of the clones that were originally published in the official market, 76% of them are malware.
|
|