• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Jiao Sibei, Ying Lingyun, Yang Yi, Cheng Yao, Su Purui, and Feng Dengguo. An Anti-Obfuscation Method for Detecting Similarity Among Android Applications in Large Scale[J]. Journal of Computer Research and Development, 2014, 51(7): 1446-1457.
Citation: Jiao Sibei, Ying Lingyun, Yang Yi, Cheng Yao, Su Purui, and Feng Dengguo. An Anti-Obfuscation Method for Detecting Similarity Among Android Applications in Large Scale[J]. Journal of Computer Research and Development, 2014, 51(7): 1446-1457.

An Anti-Obfuscation Method for Detecting Similarity Among Android Applications in Large Scale

More Information
  • Published Date: July 14, 2014
  • Code obfuscation exerts a huge impact on similarity detection among Android applications based on behavior characteristics. In order to deal with the situation, we propose a novel way of similarity detection among Android applications based on file content characteristics, which computes the similarity of file content features and can be applied to large-scale scenario in real world. Our method is not subject to code obfuscation or file obfuscation. We choose to utilize the characteristics of image, audio and layout files which are shown in our statistics as the most representative features in Android applications. Meanwhile, different weights are given to these features through machine learning, which further enhances the accuracy of our method. In addition, we implement a prototype system and particularly optimize each step to speed up the calculation, making our system suitable for large-scale scenario and give a good calculation performance. The experiments dataset contains 59 000 applications. And for both legitimate application and malware applications, our system successfully detects those repackaged pirate applications and those with the similar malicious component, which prove the effectiveness of our method. The experiment results demonstrate that similarity detection based on file content characteristics could resist the file obfuscation and give better performance in both accuracy and efficiency.
  • Related Articles

    [1]Zhang Zelin, Wang Huaqun. Dynamic Key Management of Industrial Internet Based on Blockchain[J]. Journal of Computer Research and Development, 2023, 60(2): 386-397. DOI: 10.7544/issn1000-1239.202111095
    [2]Li Chunhua, Wang Hua, Zhang Yanzhe, Zhou Ke. Optimization for Broadcast Encryption in Cloud Using Extended Public Key[J]. Journal of Computer Research and Development, 2017, 54(12): 2818-2824. DOI: 10.7544/issn1000-1239.2017.20170902
    [3]Qin Xiongjun, Zhang Jiacheng, Lu Youyou, Shu Jiwu. A Key-Value Database Optimization Method Based on Raw Flash Device[J]. Journal of Computer Research and Development, 2017, 54(6): 1326-1336. DOI: 10.7544/issn1000-1239.2017.20170092
    [4]Ma Jun, Guo Yuanbo, Ma Jianfeng, Zhang Qi. A Time-Bound Hierarchical Access Control Scheme for Ubiquitous Sensing Network[J]. Journal of Computer Research and Development, 2017, 54(2): 328-337. DOI: 10.7544/issn1000-1239.2017.20150925
    [5]Ma Chunguang, Wang Jiuru, Wu Peng, Zhang Hua. M-IBE Based Key Management Protocol for Heterogeneous Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(10): 2109-2116.
    [6]Wang Lina, Ren Zhengwei, Dong Yongfeng, Yu Rongwei, Deng Ruyi. A Management Approach to Key-Used Times Based on Trusted Platform Module in Cloud Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1628-1636.
    [7]Ma Jun, Guo Yuanbo, Ma Jianfeng, Xiong Jinbo, Zhang Tao. A Hierarchical Access Control Scheme for Perceptual Layer of IoT[J]. Journal of Computer Research and Development, 2013, 50(6): 1267-1275.
    [8]Wang Gang, Wen Tao, Guo Quan, Ma Xuebin. An Efficient and Secure Group Key Management Scheme in Mobile Ad Hoc Networks[J]. Journal of Computer Research and Development, 2010, 47(5): 911-920.
    [9]Chen Haikun, Shi Shengfei, and Li Jianzhong. A Key Management Scheme Based on Variable Transmission Range in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 165-171.
    [10]Feng Tao and Ma Jianfeng. A General Key Seed Management and Assignment Model for Wireless Sensor Networks and Application[J]. Journal of Computer Research and Development, 2008, 45(1): 146-153.

Catalog

    Article views (1548) PDF downloads (753) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return