Detecting Camouflaged Applications on Mobile Application Markets

Application plagiarism or application cloning is an emerging threat in mobile application markets. It reduces profits of original developers and sometimes even harms the security and privacy of users. In this paper, we introduce a new concept, called camouflaged applications, where external features...

Full description

Saved in:
Bibliographic Details
Main Authors: SU, Mon Kywe, LI, Yingjiu, DENG, Huijie Robert, HONG, Jason
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2014
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/2601
https://ink.library.smu.edu.sg/context/sis_research/article/3601/viewcontent/DetectingCamouflagedApplication_2017_av.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-3601
record_format dspace
spelling sg-smu-ink.sis_research-36012020-01-03T14:06:19Z Detecting Camouflaged Applications on Mobile Application Markets SU, Mon Kywe LI, Yingjiu DENG, Huijie Robert HONG, Jason Application plagiarism or application cloning is an emerging threat in mobile application markets. It reduces profits of original developers and sometimes even harms the security and privacy of users. In this paper, we introduce a new concept, called camouflaged applications, where external features of mobile applications, such as icons, screenshots, application names or descriptions, are copied. We then propose a scalable detection framework, which can find these suspiciously similar camouflaged applications. To accomplish this, we apply text-based retrieval methods and content-based image retrieval methods in our framework. Our framework is implemented and tested with 30,625 Android applications from the official Google Play market. The experiment results show that even the official market is comprised of 477 potential camouflaged victims, which cover 1.56 % of tested samples. Our paper highlights that these camouflaged applications not only expose potential security threats but also degrade qualities of mobile application markets. Our paper also analyze the behaviors of detected camouflaged applications and calculate the false alarm rates of the proposed framework. 2014-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/2601 info:doi/10.1007/978-3-319-15943-0_15 https://ink.library.smu.edu.sg/context/sis_research/article/3601/viewcontent/DetectingCamouflagedApplication_2017_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Camouflaged applications Application plagiarism Cloning Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Camouflaged applications
Application plagiarism
Cloning
Information Security
spellingShingle Camouflaged applications
Application plagiarism
Cloning
Information Security
SU, Mon Kywe
LI, Yingjiu
DENG, Huijie Robert
HONG, Jason
Detecting Camouflaged Applications on Mobile Application Markets
description Application plagiarism or application cloning is an emerging threat in mobile application markets. It reduces profits of original developers and sometimes even harms the security and privacy of users. In this paper, we introduce a new concept, called camouflaged applications, where external features of mobile applications, such as icons, screenshots, application names or descriptions, are copied. We then propose a scalable detection framework, which can find these suspiciously similar camouflaged applications. To accomplish this, we apply text-based retrieval methods and content-based image retrieval methods in our framework. Our framework is implemented and tested with 30,625 Android applications from the official Google Play market. The experiment results show that even the official market is comprised of 477 potential camouflaged victims, which cover 1.56 % of tested samples. Our paper highlights that these camouflaged applications not only expose potential security threats but also degrade qualities of mobile application markets. Our paper also analyze the behaviors of detected camouflaged applications and calculate the false alarm rates of the proposed framework.
format text
author SU, Mon Kywe
LI, Yingjiu
DENG, Huijie Robert
HONG, Jason
author_facet SU, Mon Kywe
LI, Yingjiu
DENG, Huijie Robert
HONG, Jason
author_sort SU, Mon Kywe
title Detecting Camouflaged Applications on Mobile Application Markets
title_short Detecting Camouflaged Applications on Mobile Application Markets
title_full Detecting Camouflaged Applications on Mobile Application Markets
title_fullStr Detecting Camouflaged Applications on Mobile Application Markets
title_full_unstemmed Detecting Camouflaged Applications on Mobile Application Markets
title_sort detecting camouflaged applications on mobile application markets
publisher Institutional Knowledge at Singapore Management University
publishDate 2014
url https://ink.library.smu.edu.sg/sis_research/2601
https://ink.library.smu.edu.sg/context/sis_research/article/3601/viewcontent/DetectingCamouflagedApplication_2017_av.pdf
_version_ 1770572521501884416