Visible to the public Analysis of content copyright infringement in mobile application markets

TitleAnalysis of content copyright infringement in mobile application markets
Publication TypeConference Paper
Year of Publication2015
AuthorsJohnson, R., Kiourtis, N., Stavrou, A., Sritapan, V.
Conference Name2015 APWG Symposium on Electronic Crime Research (eCrime)
Keywordsandroid, Androids, back-end servers, content copyright infringement, copyright, cyber-lockers, Humanoid robots, ios, Java, mobile application markets, Mobile communication, mobile computing, mobile devices, Mobile handsets, network locations, paid entertainment, paid streaming content, pirated content streaming, pubcrawl170109, search criteria, search keywords, Servers, Uniform resource locators, unofficial mobile markets, URL, video content, Windows mobile applications, Writing
Abstract

As mobile devices increasingly become bigger in terms of display and reliable in delivering paid entertainment and video content, we also see a rise in the presence of mobile applications that attempt to profit by streaming pirated content to unsuspected end-users. These applications are both paid and free and in the case of free applications, the source of funding appears to be advertisements that are displayed while the content is streamed to the device. In this paper, we assess the extent of content copyright infringement for mobile markets that span multiple platforms (iOS, Android, and Windows Mobile) and cover both official and unofficial mobile markets located across the world. Using a set of search keywords that point to titles of paid streaming content, we discovered 8,592 Android, 5,550 iOS, and 3,910 Windows mobile applications that matched our search criteria. Out of those applications, hundreds had links to either locally or remotely stored pirated content and were not developed, endorsed, or, in many cases, known to the owners of the copyrighted contents. We also revealed the network locations of 856,717 Uniform Resource Locators (URLs) pointing to back-end servers and cyber-lockers used to communicate the pirated content to the mobile application.

DOI10.1109/ECRIME.2015.7120798
Citation Keyjohnson_analysis_2015