Skip to main content

A Rapid and Scalable Method for Android Application Repackaging Detection

  • Conference paper
Information Security Practice and Experience (ISPEC 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9065))

Abstract

Nowadays the security issues of Android applications (apps) are more and more serious. One of the main security threats come from repackaged apps. There already are some researches detecting repackaged apps using similarity measurement. However, so far, all the existing techniques for repackaging detection are based on code similarity or feature (e.g., permission set) similarity evaluation. In this paper, we propose a novel approach called ImageStruct that applies image similarity technique to locate and detect the changes coming from repackaging effectively. ImageStruct performs a quick repackaging detection by considering the similarity of images in target apps. The intuition behind our approach is that the repackaged apps still need to maintain the ”look and feel” of the original apps by including the original images, even they might have their additional code included or some of the original code removed. To prove the effectiveness and evaluate the reliability of our approach, we carry out the compare experiments between ImageStruct and the code based similarity scores of AndroGuard. The results demonstrate that ImageStruct is not only with good performance and scalability, but also able to resistant to code obfuscation.

An erratum for this chapter can be found at http://dx.doi.org/10.1007/978-3-319-17533-1_39

An erratum to this chapter can be found at http://dx.doi.org/10.1007/978-3-319-17533-1_39

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Strategy Analytics. Strategy analytics: 85% of phones shipped last quarter run android (2014), http://bgr.com/2014/07/31/android-vs-ios-vs-windows-phone-vs-blackberry/

  2. anthony.desnos@gmail.com. Androguard: Reverse engineering, malware and goodware analysis of android applications (2013), https://code.google.com/p/androguard/

  3. AppBrain. Number of android applications (2014), http://www.appbrain.com/stats/number-of-android-apps

  4. Cilibrasi, R., Vitanyi, P.M.B.: Clustering by compression. IEEE Transactions on Information Theory 51(4), 1523–1545 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  5. Crussell, J., Gibler, C., Chen, H.: Attack of the clones: Detecting cloned applications on android markets. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 37–54. Springer, Heidelberg (2012), http://dx.doi.org/10.1007/978-3-642-33167-1_3

    Chapter  Google Scholar 

  6. Desnos, A.: Android: Static analysis using similarity distance. In: 2012 45th Hawaii International Conference on System Science (HICSS), pp. 5394–5403 (January 2012)

    Google Scholar 

  7. Evan, K., David, S.: Phash (2014), http://www.phash.org/

  8. Hanna, S., Huang, L., Wu, E., Li, S., Chen, C., Song, D.: Juxtapp: A scalable system for detecting code reuse among android applications. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 62–81. Springer, Heidelberg (2013), http://dx.doi.org/10.1007/978-3-642-37300-8_4

    Chapter  Google Scholar 

  9. Hu, W., Tao, J., Ma, X., Zhou, W., Zhao, S., Han, T.: Migdroid: Detecting app-repackaging android malware via method invocation graph. In: 2014 23rd International Conference on Computer Communication and Networks (ICCCN), pp. 1–7 (August 2014)

    Google Scholar 

  10. Huang, H., Zhu, S., Liu, P., Wu, D.: A framework for evaluating mobile app repackaging detection algorithms. In: Huth, M., Asokan, N., Čapkun, S., Flechais, I., Coles-Kemp, L. (eds.) TRUST 2013. LNCS, vol. 7904, pp. 169–186. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  11. Google Inc. Android dvelopment guide: Signing your applications (2014), http://developer.android.com/guide/publishing/app-signing.html

  12. Oracle Inc. Mysql (2014), http://www.mysql.com/

  13. Symantec Inc. Android threats getting steamy (May 7 (2011), http://www.symantec.com/connect/blogs/android-threats-getting-steamy

  14. J. Craig Venter Institute. Sift (2014), http://sift.jcvi.org/

  15. Li, S.: Juxtapp and DStruct: Detection of Similarity Among Android Applications. PhD thesis, EECS Department, University of California, Berkeley (2012)

    Google Scholar 

  16. Oberheide, J.: Dissecting the android bouncer (2012), https://jon.oberheide.org/files/summercon12-bouncer.pdf

  17. Sanfilippo, S.: Redis (2014), http://redis.io/topics/sponsors

  18. Studios, H.: Fruit ninja (2013), http://halfbrick.com/

  19. Ulrich, B., Paolo, M.C., Clemens, H., Christopher, K., Engin, K.: Scalable, behavior-based malware clustering. In: Proceedings of Network and Distributed System Security Symposium 2009. Citeseer (2009)

    Google Scholar 

  20. Wikipedia. Color histogram (2014), http://en.wikipedia.org/wiki/Color_histogram

  21. Zhou, W., Zhou, Y., Grace, M., Jiang, X., Zou, S.: Fast, scalable detection of “piggybacked” mobile applications. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 185–196. ACM (2013)

    Google Scholar 

  22. Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, pp. 317–326. ACM (2012)

    Google Scholar 

  23. Zhou, Y., Jiang, X.: Dissecting android malware: Characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95–109 (May 2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sibei Jiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Jiao, S., Cheng, Y., Ying, L., Su, P., Feng, D. (2015). A Rapid and Scalable Method for Android Application Repackaging Detection. In: Lopez, J., Wu, Y. (eds) Information Security Practice and Experience. ISPEC 2015. Lecture Notes in Computer Science(), vol 9065. Springer, Cham. https://doi.org/10.1007/978-3-319-17533-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17533-1_24

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17532-4

  • Online ISBN: 978-3-319-17533-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics