...
首页> 外文期刊>Procedia Computer Science >Android Applications Repackaging Detection Techniques for Smartphone Devices
【24h】

Android Applications Repackaging Detection Techniques for Smartphone Devices

机译:Android应用程序重新包装智能手机设备的检测技术

获取原文
           

摘要

The problem of malwares affecting Smartphones has been widely recognized by the researchers across the world. Majority of these malwares target Android OS. Studies have found that most of the Android malwares hide inside repackaged apps to get inside user devices. Repackaged apps are usually infected versions of popular apps. Adversaries download a popular Android app, and obtain the code using reverse engineering and then add their code (often malicious) to it and repackage and release the app. A number of techniques proposed in research and a number of commercial anti-virus products focus on detecting malwares. This is the traditional approach and requires a signature database. Zero day threats cannot be caught with such methods. There are many techniques which focus entirely on detecting repackaged apps. Since repackaged apps are in the majority among the infected Android apps, they can save the user from a large percentage of Android malwares. Detection and prevention of repackaging is also beneficial for original developer/publisher as they do not incur harm to revenue or reputation. In this paper? we study in detail about some of the repackaging detection techniques. Mainly, there are two kinds of techniques - offline and online. They serve different purposes. An offline technique cannot be replaced by an online technique and vice versa. Offline techniques are for direct use of app market owner, whereas online techniques are for direct use of Android users. We study different offline and online techniques. These techniques use different features and metrics to detect similarity of apps and they are representatives of their category of techniques.
机译:影响智能手机的恶意软件问题已被全球研究人员广泛认可。这些恶意软件主要针对Android操作系统。研究发现,大多数Android恶意软件都隐藏在重新包装的应用程序中,以进入用户设备。重新打包的应用通常是流行应用的受感染版本。对手下载一个流行的Android应用程序,并使用逆向工程获取代码,然后将其代码(通常是恶意代码)添加到其中,然后重新打包并发布该应用程序。研究中提出的许多技术和许多商业防病毒产品都专注于检测恶意软件。这是传统方法,需要签名数据库。使用这种方法无法捕获零日威胁。有许多技术完全专注于检测重新打包的应用程序。由于重新打包的应用程序在受感染的Android应用程序中占多数,因此它们可以将用户从大量的Android恶意软件中拯救出来。检测和防止重新包装对于原始开发者/发布者来说也是有益的,因为它们不会损害收入或声誉。在本文中?我们将详细研究一些重新包装检测技术。主要有两种技术-脱机和联机。它们有不同的用途。离线技术不能用在线技术代替,反之亦然。离线技术用于直接使用应用程序市场所有者,而在线技术则用于直接使用Android用户。我们研究不同的离线和在线技术。这些技术使用不同的功能和指标来检测应用程序的相似性,它们代表了其技术类别。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号