Repackaging of applications is one of the key attack vectors for mobile malware. This is particularly easy and popular in Android Markets, where applications can be downloaded, decompiled, modified and re-uploaded at a very low cost. Detecting clones and victims is often a hard task, especially in markets with several million of applications to analyze, such as Google Play Store. This work proposes CloneSpot, a novel methodology to efficiently detect Repackaged versions of Android apps using Min-Hashing techniques applied to applications’ meta-data publicly available at Google Play. We validate our approach by analyzing 1.3 Million of applications collected from Google Play in September 2017, from which around 420K are detected as potential...
Abstract. The popularity and utility of smartphones rely on their vi-brant application markets; howe...
Mobile apps emulation is increasing becoming serious threat. Criminals target popular apps that are ...
Over the past few years, concerns have been raised with respect to the increasing number of maliciou...
Repackaging of applications is one of the key attack vectors for mobile malware. This is particularl...
peer reviewedThe ease of Android applications repackaging and proliferation of application clones in...
The last decade has shown a steady rate of Android device dominance in market share and the emergenc...
The huge benefit of mobile application industry has attracted a large number of developers and atten...
AbstractGoogle Play is the official market of Android apps. The app publishers make money by selling...
Abstract—Smartphones rely on their vibrant application markets; however, plagiarism threatens the lo...
Besides traditional problems such as potential bugs, (smart-phone) application clones on Android mar...
Repackaged Android applications (app clones) have been found in many third-party markets, which not ...
Due to the widespread usage of Android smartphones in the present era, Android malware has become a ...
peer reviewedAndroid app repackaging threatens the health of application markets, as repackaged apps...
Android apps are sources of revenue for their developers, yet it is very easy to plagiarize a third-...
With an estimated of 2.1 million people having access to smartphones, the number and variety of mobi...
Abstract. The popularity and utility of smartphones rely on their vi-brant application markets; howe...
Mobile apps emulation is increasing becoming serious threat. Criminals target popular apps that are ...
Over the past few years, concerns have been raised with respect to the increasing number of maliciou...
Repackaging of applications is one of the key attack vectors for mobile malware. This is particularl...
peer reviewedThe ease of Android applications repackaging and proliferation of application clones in...
The last decade has shown a steady rate of Android device dominance in market share and the emergenc...
The huge benefit of mobile application industry has attracted a large number of developers and atten...
AbstractGoogle Play is the official market of Android apps. The app publishers make money by selling...
Abstract—Smartphones rely on their vibrant application markets; however, plagiarism threatens the lo...
Besides traditional problems such as potential bugs, (smart-phone) application clones on Android mar...
Repackaged Android applications (app clones) have been found in many third-party markets, which not ...
Due to the widespread usage of Android smartphones in the present era, Android malware has become a ...
peer reviewedAndroid app repackaging threatens the health of application markets, as repackaged apps...
Android apps are sources of revenue for their developers, yet it is very easy to plagiarize a third-...
With an estimated of 2.1 million people having access to smartphones, the number and variety of mobi...
Abstract. The popularity and utility of smartphones rely on their vi-brant application markets; howe...
Mobile apps emulation is increasing becoming serious threat. Criminals target popular apps that are ...
Over the past few years, concerns have been raised with respect to the increasing number of maliciou...