Please use this identifier to cite or link to this item: http://hdl.handle.net/10125/64555

Detecting Repackaged Android Applications Using Perceptual Hashing

File Size Format  
0656.pdf 1.06 MB Adobe PDF View/Open

Item Summary

Title:Detecting Repackaged Android Applications Using Perceptual Hashing
Authors:Nguyen, Thanh
Mcdonald, Jeffrey
Glisson, William
Andel, Todd
Keywords:Software Development for Mobile Devices, the Internet-of-Things, and Cyber-Physical Systems
android
malware
mobile device security
perceptual hashing
Date Issued:07 Jan 2020
Abstract:The last decade has shown a steady rate of Android device dominance in market share and the emergence of hundreds of thousands of apps available to the public. Because of the ease of reverse engineering Android applications, repackaged malicious apps that clone existing code have become a severe problem in the marketplace. This research proposes a novel repackaged detection system based on perceptual hashes of vetted Android apps and their associated dynamic user interface (UI) behavior. Results show that an average hash approach produces 88% accuracy (indicating low false negative and false positive rates) in a sample set of 4878 Android apps, including 2151 repackaged apps. The approach is the first dynamic method proposed in the research community using image-based hashing techniques with reasonable performance to other known dynamic approaches and the possibility for practical implementation at scale for new applications entering the Android market.
Pages/Duration:10 pages
URI:http://hdl.handle.net/10125/64555
ISBN:978-0-9981331-3-3
DOI:10.24251/HICSS.2020.813
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
https://creativecommons.org/licenses/by-nc-nd/4.0/
Appears in Collections: Software Development for Mobile Devices, the Internet-of-Things, and Cyber-Physical Systems


Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons