Feature point detection for repacked android apps

13Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Repacked mobile applications and obfuscation attacks constitute a sig-nificant threat to the Android technological ecosystem. A novel method using the Constant Key Point Selection and Limited Binary Pattern Feature (CKPS: LBP) extraction-based Hashing has been proposed to identify repacked Android applications in previous works. Although the approach was efficient in detecting the repacked Android apps, it was not suitable for detecting obfuscation attacks. Additionally, the time complexity needed improvement. This paper presents an optimization technique using Scalable Bivariant Feature Transformation extract optimum feature-points extraction, and the Harris method applied for optimized image hashing. The experiments produced better results than the CKPS: LBP method in terms of execution time. Further, the proposed method is extended to detect obfuscation of malware attacks by detecting the packed executables, which is the initial step in obfuscation attack detection.

Cite

CITATION STYLE

APA

Rahim Khan, M. A., & Jain, M. K. (2020). Feature point detection for repacked android apps. Intelligent Automation and Soft Computing, 26(6), 1359–1373. https://doi.org/10.32604/iasc.2020.013849

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free