Attack of the clones: Detecting cloned applications on Android markets

183Citations
Citations of this article
156Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present DNADroid, a tool that detects Android application copying, or "cloning", by robustly computing the similarity between two applications. DNADroid achieves this by comparing program dependency graphs between methods in candidate applications. Using DNADroid, we found at least 141 applications that have been the victims of cloning, some as many as seven times. DNADroid has a very low false positive rate - we manually confirmed that all the applications detected are indeed clones by either visual or behavioral similarity. We present several case studies that give insight into why applications are cloned, including localization and redirecting ad revenue. We describe a case of malware being added to an application and show how DNADroid was able to detect two variants of the same malware. Lastly, we offer examples of an open source cracking tool being used in the wild. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Crussell, J., Gibler, C., & Chen, H. (2012). Attack of the clones: Detecting cloned applications on Android markets. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7459 LNCS, pp. 37–54). https://doi.org/10.1007/978-3-642-33167-1_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free