Towards Attribution in Mobile Markets: Identifying Developer Account Polymorphism

17Citations
Citations of this article
46Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Malicious developers may succeed at publishing their apps in mobile markets, including the official ones. If reported, the apps will be taken down and the developer accounts possibly be banned. Unfortunately, such take-downs do not prevent the attackers to use other developer accounts to publish variations of their malicious apps. This work presents a novel approach for identifying developer accounts, and other indicators of compromise (IOCs) in mobile markets, that belong to the same operation, i.e., to the same owners. Given a set of seed IOCs, our approach explores app and version metadata to identify new IOCs that belong to the same operation. It outputs an attribution graph, which details the attribution inferences, so that they can be reviewed. We have implemented our approach into Retriever, a tool that supports multiple mobile markets including the official GooglePlay and AppleStore. We have evaluated Retriever on 17 rogueware and adware operations. In 94% of the operations, Retriever discovers at least one previously unknown developer account. Furthermore, Retriever reveals that operations that look dead still have active developer accounts.

Cite

CITATION STYLE

APA

Sebastian, S., & Caballero, J. (2020). Towards Attribution in Mobile Markets: Identifying Developer Account Polymorphism. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 771–785). Association for Computing Machinery. https://doi.org/10.1145/3372297.3417281

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free