Abstract

The popularity of Android brings many functionalities to its users but it also brings many threats. Repacked Android application is one such threat which is the root of many other threats such as malware, phishing, adware, and economical loss. Earlier many techniques have been proposed for the detection of repacked application but they have their limitations and bottlenecks. In this work, we proposed an image similarity based repacked application detection technique. The proposed work utilized the main idea behind the repacking of application that is “the attacker wants to create fake application looking visually similar to the original". We convert each APK file into a grayscale image and then use perceptual hashing for creating a hash of each image. The string distance algorithms like Hamming distance was used to calculate the distance and searching for the repacked application. The proposed work also used distance calculation on binary features extracted from the app. The proposed work is very powerful in terms of detection accuracy and scanning speed and we achieved 96% accuracy.

Highlights

  • The popularity of Android brings many functionalities to its users but it brings many threats

  • The proposed work is very effective in terms of detection accuracy and scanning speed and we achieved 96% accuracy

  • We have proposed a technique to detect repacked Android applications by the help of the ImageHash technique termed as perceptual hashing

Read more

Summary

INTRODUCTIÓN

The realization of the need for ubiquitous computing has boosted the development of the mobile application which can be noticed by the presence on millions of apps and their download counts in various official and alternative major Android app stores. The sale of different kind of services and advertisement is two main benign methods for revenue whereas attackers exploit these apps for various other monetary gains such as Premium SMS, malware-as-a-service, Pay-per-install, etc. Repacked Android application is a major challenge to the Android ecosystem, according to Zhou and Jiang (2012), 86% of the detected malware is repackaged apps. The App repackaging is one of most broadly utilized assault method of Android malware (Jiang & Zhou, 2013). The proposed work is very effective in terms of detection accuracy and scanning speed and we achieved 96% accuracy

Main Contributions
Related Works
Proposed work
Apk to Image conversion
Feature Extraction
Image hashing
Hash comparison
Hash Distance Calculation
Static Feature Comparison
1.10 Similarity Calculator
1.11 Certificate Verifier
EXPERIMENTS
Many-to-Many
Dataset
Implementation
One-to-Many Comparison
Many-to-Many Comparison
Findings
CONCLUSIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.