Visible to the public A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information

TitleA New Technique for Detecting Android App Clones Using Implicit Intent and Method Information
Publication TypeConference Paper
Year of Publication2019
AuthorsKim, Byoungchul, Jung, Jaemin, Han, Sangchul, Jeon, Soyeon, Cho, Seong-je, Choi, Jongmoo
Conference Name2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN)
Date Publishedjul
KeywordsAndorid app, Android (operating system), Android app clones detection, Android ecosystem, android encryption, class method, clone detection, Cloning, Code Obfuscation, code obfuscation techniques, data mining, Encryption, feature extraction, Human Behavior, implicit intents, intent, invasive software, malicious codes, Malware, method information, Metrics, mobile computing, online markets, pubcrawl, repackaged apps, Resiliency, reverse engineering, Scalability, Tools
AbstractDetecting repackaged apps is one of the important issues in the Android ecosystem. Many attackers usually reverse engineer a legitimate app, modify or embed malicious codes into the app, repackage and distribute it in the online markets. They also employ code obfuscation techniques to hide app cloning or repackaging. In this paper, we propose a new technique for detecting repackaged Android apps, which is robust to code obfuscation. The technique analyzes the similarity of Android apps based on the method call information of component classes that receive implicit intents. We developed a tool Calldroid that implemented the proposed technique, and evaluated it on apps transformed using well-known obfuscators. The evaluation results showed that the proposed technique can effectively detect repackaged apps.
DOI10.1109/ICUFN.2019.8806121
Citation Keykim_new_2019