Detecting Camouflaged Applications on Mobile Application Markets
Application plagiarism or application cloning is an emerging threat in mobile application markets. It reduces profits of original developers and sometimes even harms the security and privacy of users. In this paper, we introduce a new concept, called camouflaged applications, where external features...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2014
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/2601 https://ink.library.smu.edu.sg/context/sis_research/article/3601/viewcontent/DetectingCamouflagedApplication_2017_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-3601 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-36012020-01-03T14:06:19Z Detecting Camouflaged Applications on Mobile Application Markets SU, Mon Kywe LI, Yingjiu DENG, Huijie Robert HONG, Jason Application plagiarism or application cloning is an emerging threat in mobile application markets. It reduces profits of original developers and sometimes even harms the security and privacy of users. In this paper, we introduce a new concept, called camouflaged applications, where external features of mobile applications, such as icons, screenshots, application names or descriptions, are copied. We then propose a scalable detection framework, which can find these suspiciously similar camouflaged applications. To accomplish this, we apply text-based retrieval methods and content-based image retrieval methods in our framework. Our framework is implemented and tested with 30,625 Android applications from the official Google Play market. The experiment results show that even the official market is comprised of 477 potential camouflaged victims, which cover 1.56 % of tested samples. Our paper highlights that these camouflaged applications not only expose potential security threats but also degrade qualities of mobile application markets. Our paper also analyze the behaviors of detected camouflaged applications and calculate the false alarm rates of the proposed framework. 2014-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/2601 info:doi/10.1007/978-3-319-15943-0_15 https://ink.library.smu.edu.sg/context/sis_research/article/3601/viewcontent/DetectingCamouflagedApplication_2017_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Camouflaged applications Application plagiarism Cloning Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Camouflaged applications Application plagiarism Cloning Information Security |
spellingShingle |
Camouflaged applications Application plagiarism Cloning Information Security SU, Mon Kywe LI, Yingjiu DENG, Huijie Robert HONG, Jason Detecting Camouflaged Applications on Mobile Application Markets |
description |
Application plagiarism or application cloning is an emerging threat in mobile application markets. It reduces profits of original developers and sometimes even harms the security and privacy of users. In this paper, we introduce a new concept, called camouflaged applications, where external features of mobile applications, such as icons, screenshots, application names or descriptions, are copied. We then propose a scalable detection framework, which can find these suspiciously similar camouflaged applications. To accomplish this, we apply text-based retrieval methods and content-based image retrieval methods in our framework. Our framework is implemented and tested with 30,625 Android applications from the official Google Play market. The experiment results show that even the official market is comprised of 477 potential camouflaged victims, which cover 1.56 % of tested samples. Our paper highlights that these camouflaged applications not only expose potential security threats but also degrade qualities of mobile application markets. Our paper also analyze the behaviors of detected camouflaged applications and calculate the false alarm rates of the proposed framework. |
format |
text |
author |
SU, Mon Kywe LI, Yingjiu DENG, Huijie Robert HONG, Jason |
author_facet |
SU, Mon Kywe LI, Yingjiu DENG, Huijie Robert HONG, Jason |
author_sort |
SU, Mon Kywe |
title |
Detecting Camouflaged Applications on Mobile Application Markets |
title_short |
Detecting Camouflaged Applications on Mobile Application Markets |
title_full |
Detecting Camouflaged Applications on Mobile Application Markets |
title_fullStr |
Detecting Camouflaged Applications on Mobile Application Markets |
title_full_unstemmed |
Detecting Camouflaged Applications on Mobile Application Markets |
title_sort |
detecting camouflaged applications on mobile application markets |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2014 |
url |
https://ink.library.smu.edu.sg/sis_research/2601 https://ink.library.smu.edu.sg/context/sis_research/article/3601/viewcontent/DetectingCamouflagedApplication_2017_av.pdf |
_version_ |
1770572521501884416 |