Skip to main content

Timing-Based Clone Detection on Android Markets

  • Conference paper
  • First Online:
International Conference on Security and Privacy in Communication Networks (SecureComm 2014)

Abstract

With the growth of smartphone users, mobile phone applications increase exponentially. But a lot of apps are cloned. We design a timing-based clone detection method. By choosing several lists of inputs, we can get the corresponding CPU time usage, which composes a CPU time usage tuple. After comparing these tuples, we can find the clone apps. At last, we do some experiments to verify our methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gibler, C., Stevens, R., Crussell, J., Chen, H., Zang, H., Choi, H.: Adrob: examining the landscape and impact of android application plagiarism. In: Proceedings of 11th International Conference on Mobile Systems, Applications and Services (2013)

    Google Scholar 

  2. Baxter, I., Yahin, A., Moura, L., Anna, M., Bier, L.: Clone Detection using abstract syntax trees. In: Proceedings of International conference on Software Maintenance (1998)

    Google Scholar 

  3. Pham, N.H., Nguyen, H.A., Nguyen, T.T.: Complete and accurate clone detection in graph-based methods. In: Proceedings of the 31st International Conference on Software Engineering, pp. 276–286 (2009)

    Google Scholar 

  4. Krinke, J.: Identifying similar code with program dependence graphs. In: Proceedings of Eighth Working Conference on Reverse Engineering (2001)

    Google Scholar 

  5. Kamiya, T., Kusumoto, S., Inoue, K.: CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Software Eng. 28(7), 654–670 (2002)

    Article  Google Scholar 

  6. Chen, K., Liu, P., Zhang, Y.: Achieving accuracy and scalability simultaneously in detecting application clones on android markets. In: ICSE (2014)

    Google Scholar 

  7. Wang, X., Jhi, Y., Zhu, S., Liu, P.: Behavior based software theft detection. In: CCS (2009)

    Google Scholar 

  8. Sæbjørnsen, A., Willcock, J., Panas, T.: Detecting code clones in binary executables. In: ISSTA (2009)

    Google Scholar 

  9. Schuler, D., Dallmeier, V., Lindig, C.: A dynamic birthmark for java. In: Proceedings of the Twenty-Second IEEE/ACM International Conference on Automated Software Engineering, pp. 274–283 (2009)

    Google Scholar 

  10. Wang, X., Jhi, Y.C., Zhu, S., Liu, P.: Detecting software theft via system call based birthmarks. In: ACSAC, pp. 149–158 (2009)

    Google Scholar 

  11. Choi, S., Park, H., Lim, H., Han, T.: A static birthmark of binary executables based on API call structure. In: ASIAN, pp. 2–16 (2007)

    Google Scholar 

  12. Chan, P.P.F., Hui, L.C.K., Yiu, S.M.: JSBiRTH: dynamic JavaScript birthmark based on the run-time heap. In: IEEE 35th Annual Computer Software and Applications Conference (COMPSAC), pp. 407–412 (2011)

    Google Scholar 

  13. Crussell, J., Gibler, C., Chen, H.: Attack of the clones: detecting cloned applications on android markets. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 37–54. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  14. Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: CODASPY, pp. 317–326. ACM (2012)

    Google Scholar 

  15. Nyman, N.: Using monkey test tools. Softw. Test. Qual. Eng. (2000)

    Google Scholar 

Download references

Acknowlegements

The authors would like to thank the anonymous reviewers for their constructive feedback. This material is based upon work supported in part by the National Natural Science Foundation of China under grant no. 61100226 and 61303248, the National High Technology Research and Development Program (863 Program) of China under grant no. SQ2013GX02D01211, and the Natural Science Foundation of Beijing under grant no. 4122085 and 4144089.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yingjun Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Zhang, Y., Huang, K., Liu, Y., Chen, K., Huang, L., Lian, Y. (2015). Timing-Based Clone Detection on Android Markets. In: Tian, J., Jing, J., Srivatsa, M. (eds) International Conference on Security and Privacy in Communication Networks. SecureComm 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 153. Springer, Cham. https://doi.org/10.1007/978-3-319-23802-9_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23802-9_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23801-2

  • Online ISBN: 978-3-319-23802-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics