Skip to main content

Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques

  • Conference paper
Book cover Engineering Secure Software and Systems (ESSoS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7159))

Included in the following conference series:

Abstract

In this paper, we show how an attacker can launch malware onto a large number of smartphone users by plagiarizing Android applications and by using elements of social engineering to increase infection rate. Our analysis of a dataset of 158,000 smartphone applications meta-information indicates that 29.4% of the applications are more likely to be plagiarized. We propose three detection schemes that rely on syntactic fingerprinting to detect plagiarized applications under different levels of obfuscation used by the attacker. Our analysis of 7,600 smartphone application binaries shows that our schemes detect all instances of plagiarism from a set of real-world malware incidents with 0.5% false positives and scale to millions of applications using only commodity servers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kerris, N., Neumayr, T.: Apple App Store Downloads Top Two Billion (2009)

    Google Scholar 

  2. Chu, E.: Android Market: A User-driven Content Distribution System (2008)

    Google Scholar 

  3. Animal Rights Protesters use Mobile Means for their Message, http://goo.gl/An7Rp

  4. Warning on Possible Android Mobile Trojans, http://goo.gl/A8Ow9

  5. Lookout Anti-Virus, https://www.mylookout.com/

  6. Norton Mobile Security, http://us.norton.com/mobile-security/

  7. Bitdefender Mobile Security, http://m.bitdefender.com/

  8. Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P., Sheth, A.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: OSDI (2010)

    Google Scholar 

  9. Nauman, M., Khan, S., Zhang, X.: Apex: Extending Android Permission Model with user-defined runtime constraints. In: ICCS (2010)

    Google Scholar 

  10. Jakobsson, M., Johansson, K.: Retroactive detection of malware with applications to mobile platforms. In: HotSec (2010)

    Google Scholar 

  11. Google Android, http://code.google.com/android

  12. Dalvik Virtual Machine, http://www.dalvikvm.com

  13. Google Android SDK, http://developer.android.com/sdk/

  14. Lafortune, E., et al.: ProGuard (2004), http://proguard.sourceforge.net

  15. Linn, C., Debray, S.K.: Obfuscation of executable code to improve resistance to static disassembly. In: CCS (2003)

    Google Scholar 

  16. Collberg, C.S., Thomborson, C.D.: Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. In: IEEE TSE (2002)

    Google Scholar 

  17. Felt, A., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. Technical Report UCB/EECS-2011-48, University of California, Berkeley, Tech. Rep. (2011)

    Google Scholar 

  18. Shneiderman, B.: Treemaps for space-constrained visualization of hierarchies. In: ACM TOG (1998)

    Google Scholar 

  19. de-Dexer, http://dedexer.sourceforge.net

  20. dex2jar, http://code.google.com/p/dex2jar/

  21. Nguyen, H., Nguyen, T., Pham, N., Al-Kofahi, J., Nguyen, T.: Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection. In: Chechik, M., Wirsing, M. (eds.) FASE 2009. LNCS, vol. 5503, pp. 440–455. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  22. Lookout Security Blog, http://goo.gl/q9sI8

  23. Arya, S., Mount, D., Netanyahu, N., Silverman, R., Wu, A.: An optimal algorithm for approximate nearest neighbor search in fixed dimensions. JACM (1998)

    Google Scholar 

  24. Jiang, L., Misherghi, G., Su, Z., Glondu, S.: Deckard: Scalable and accurate tree-based detection of code clones. In: ICSE. IEEE Computer Society (2007)

    Google Scholar 

  25. Li, Z., Lu, S., Myagmar, S., Zhou, Y.: CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. In: IEEE TSE (2006)

    Google Scholar 

  26. Apiwattanapong, T., Orso, A., Harrold, M.: A Differencing Algorithm for Object-Oriented Programs. In: ASE (2004)

    Google Scholar 

  27. Jackson, D., Ladd, D.: Semantic Diff: A Tool for Summarizing the Effects of Modifications. In: ICSM (1994)

    Google Scholar 

  28. Laski, J., Szermer, W.: Identification of Program Modifications and its Applications to Software Maintenance. In: ICSM (1992)

    Google Scholar 

  29. Aiken, A., et al.: Moss: System for detecting software plagiarism, http://www.cs.berkeley.edu/aiken/moss.html

  30. Komondoor, R., Horwitz, S.: Semantics-Preserving Procedure Extraction. In: POPL (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Gilles Barthe Benjamin Livshits Riccardo Scandariato

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Potharaju, R., Newell, A., Nita-Rotaru, C., Zhang, X. (2012). Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques. In: Barthe, G., Livshits, B., Scandariato, R. (eds) Engineering Secure Software and Systems. ESSoS 2012. Lecture Notes in Computer Science, vol 7159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28166-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28166-2_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28165-5

  • Online ISBN: 978-3-642-28166-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics