Towards fast and scalable detection of attack clones in Android applications

The mobile operating system Android gains popularity among smartphone users as they gradually integrate their lifestyle with apps that provide services for their convenience which includes entering sensitive information such as bank account numbers, credit card numbers, and passwords into the apps....

Full description

Saved in:
Bibliographic Details
Main Author: Tan, Winston Boon Keat
Other Authors: Liu Yang
Format: Final Year Project
Language:English
Published: 2015
Subjects:
Online Access:http://hdl.handle.net/10356/63617
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-63617
record_format dspace
spelling sg-ntu-dr.10356-636172023-03-03T20:31:43Z Towards fast and scalable detection of attack clones in Android applications Tan, Winston Boon Keat Liu Yang School of Computer Engineering DRNTU::Engineering::Computer science and engineering::Software::Software engineering The mobile operating system Android gains popularity among smartphone users as they gradually integrate their lifestyle with apps that provide services for their convenience which includes entering sensitive information such as bank account numbers, credit card numbers, and passwords into the apps. As such, Android is also gaining popularity in becoming the target for malicious attacks to steal such information. Despite studies and researches on methods to increase detection of malware components in suspected apps, malware are evolving and becoming more elusive to such methods. The purpose of this project is to look at existing techniques which summarize and identify malware apps with accuracy and scalability. We will also be looking at Software Architecture Recovery techniques used to accurately identify and decouple modules in a mobile application. By decoupling the modules in the app, the components can be differentiated into ad libraries and malware parts of the app. An approach which integrates existing techniques to build a system is proposed in this project. The existing techniques include generating centroids, which are representatives of methods in a class program, and using Application Similarity Degree to compare the degree of similarity between two apps. There is also Module Decoupling which decouples an app into clusters of modules which are highly similar. Soot, a third party library which provides intermediate representation of Java class files in Jimple and has the capability to perform static program analysis on programs, is used extensively in implementing the existing techniques discussed. After evaluating the system with valid tests from six different malware families and dataset of 212 ad libraries and 2468 variants of malware, the system was able to accurately identify most of the malware and ad library components from within the test apps. There were some errors which indicates that the system requires some fine-tuning such as the means of calculating the self-similarity for Affinity Propagation clustering. Bachelor of Engineering (Computer Science) 2015-05-18T02:01:28Z 2015-05-18T02:01:28Z 2015 2015 Final Year Project (FYP) http://hdl.handle.net/10356/63617 en Nanyang Technological University 51 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering::Software::Software engineering
spellingShingle DRNTU::Engineering::Computer science and engineering::Software::Software engineering
Tan, Winston Boon Keat
Towards fast and scalable detection of attack clones in Android applications
description The mobile operating system Android gains popularity among smartphone users as they gradually integrate their lifestyle with apps that provide services for their convenience which includes entering sensitive information such as bank account numbers, credit card numbers, and passwords into the apps. As such, Android is also gaining popularity in becoming the target for malicious attacks to steal such information. Despite studies and researches on methods to increase detection of malware components in suspected apps, malware are evolving and becoming more elusive to such methods. The purpose of this project is to look at existing techniques which summarize and identify malware apps with accuracy and scalability. We will also be looking at Software Architecture Recovery techniques used to accurately identify and decouple modules in a mobile application. By decoupling the modules in the app, the components can be differentiated into ad libraries and malware parts of the app. An approach which integrates existing techniques to build a system is proposed in this project. The existing techniques include generating centroids, which are representatives of methods in a class program, and using Application Similarity Degree to compare the degree of similarity between two apps. There is also Module Decoupling which decouples an app into clusters of modules which are highly similar. Soot, a third party library which provides intermediate representation of Java class files in Jimple and has the capability to perform static program analysis on programs, is used extensively in implementing the existing techniques discussed. After evaluating the system with valid tests from six different malware families and dataset of 212 ad libraries and 2468 variants of malware, the system was able to accurately identify most of the malware and ad library components from within the test apps. There were some errors which indicates that the system requires some fine-tuning such as the means of calculating the self-similarity for Affinity Propagation clustering.
author2 Liu Yang
author_facet Liu Yang
Tan, Winston Boon Keat
format Final Year Project
author Tan, Winston Boon Keat
author_sort Tan, Winston Boon Keat
title Towards fast and scalable detection of attack clones in Android applications
title_short Towards fast and scalable detection of attack clones in Android applications
title_full Towards fast and scalable detection of attack clones in Android applications
title_fullStr Towards fast and scalable detection of attack clones in Android applications
title_full_unstemmed Towards fast and scalable detection of attack clones in Android applications
title_sort towards fast and scalable detection of attack clones in android applications
publishDate 2015
url http://hdl.handle.net/10356/63617
_version_ 1759857118975885312