skip to main content
10.1145/2133601.2133640acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

Detecting repackaged smartphone applications in third-party android marketplaces

Authors Info & Claims
Published:07 February 2012Publication History

ABSTRACT

Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone applications. These smartphone applications (or apps), typically organized in different application marketplaces, can be conveniently browsed by mobile users and then simply clicked to install on a variety of mobile devices. In practice, besides the official marketplaces from platform vendors (e.g., Google and Apple), a number of third-party alternative marketplaces have also been created to host thousands of apps (e.g., to meet regional or localization needs). To maintain and foster a hygienic smartphone app ecosystem, there is a need for each third-party marketplace to offer quality apps to mobile users.

In this paper, we perform a systematic study on six popular Android-based third-party marketplaces. Among them, we find a common "in-the-wild" practice of repackaging legitimate apps (from the official Android Market) and distributing repackaged ones via third-party marketplaces. To better understand the extent of such practice, we implement an app similarity measurement system called DroidMOSS that applies a fuzzy hashing technique to effectively localize and detect the changes from app-repackaging behavior. The experiments with DroidMOSS show a worrisome fact that 5% to 13% of apps hosted on these studied marketplaces are repackaged. Further manual investigation indicates that these repackaged apps are mainly used to replace existing in-app advertisements or embed new ones to "steal" or re-route ad revenues. We also identify a few cases with planted backdoors or malicious payloads among repackaged apps. The results call for the need of a rigorous vetting process for better regulation of third-party smartphone application marketplaces.

References

  1. Smali - An Assembler/Disassembler for Android's dex Format. http://code.google.com/p/smali/. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  2. Tridgell Andrew. Spamsum README. http://samba.org/ftp/unpacked/junkcode/spamsum/README. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  3. AndroLib. Android Market Statistics from AndroLib. http://www.androlib.com/appstats.aspx. Online; accessed at June 1, 2011.Google ScholarGoogle Scholar
  4. David Barrera, William Enck, and Paul Oorschot. Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems. Technical report, School of Computer Science, Carleton University, http://www.scs.carleton.ca/shared/research/tech_reports/2010/TR-11-06%20Barrera.pdf. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  5. David Barrera, H. Güneş Kayacik, Paul C. van Oorschot, and Anil Somayaji. A Methodology for Empirical Analysis of Permission-Based Security Models and Its Application to Android. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Alastair Beresford, Andrew Rice, Nicholas Skehin, and Ripduman Sohan. MockDroid: Trading Privacy for Application Functionality on Smartphones. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Joany Boutet. Malicious Android Applications: Risks and Exploitation - A Spyware Story about Android Application and Reverse Engineering. http://www.sans.org/reading_room/whitepapers/malicious/malicious-androi%d-applications_risks-exploitation_33578. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  8. Erika Chin, Adrienne Felt, Kate Greenwood, and David Wagner. Analyzing Inter-Application Communication in Android. In Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2011, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Mihai Christodorescu, Somesh Jha, and Christopher Kruegel. Mining Specifications of Malicious Behavior. In Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC-FSE '07, pages 5--14. ACM, 2007. Google ScholarGoogle Scholar
  10. Cydia. Cydia App Store. http://cydia.saurik.com/. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  11. Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, and Dan Wallach. QUIRE: Lightweight Provenance for Smart Phone Operating Systems. In Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, San Francisco, CA, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS '11, February 2011.Google ScholarGoogle Scholar
  13. William Enck, Peter Gilbert, Byung-gon Chun, Landon Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI '11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. A Study of Android Application Security. In Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, San Francisco, CA, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. William Enck, Machigar Ongtang, and Patrick McDaniel. On Lightweight Mobile Phone Application Certification. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pages 235--245, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Adrienne Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner. Android Permissions Demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS' 11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Adrienne Felt, Helen Wang, Alexander Moschhuk, Steve Hanna, and Erika Chin. Permission Re-Delegation: Attacks and Defense. In Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, San Francisco, CA, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Adam Fuchs, Avik Chaudhuri, and Jeffrey Foster. SCanDroid: Automated Security Certification of Android Applications. http://www.cs.umd.edu/ avik/projects/scandroidascaa/paper.pdf. Online; accessed at June 1, 2011.Google ScholarGoogle Scholar
  19. Michael Grace, Yajin Zhou, Zhi Wang, and Xuxian Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12, February 2012.Google ScholarGoogle Scholar
  20. James Hunt and McIlroy Douglas. An Algorithm for Differential File Comparison. Technical report, Computing Science Technical Report, Bell Laboratories, 1976.Google ScholarGoogle Scholar
  21. Dustin Hurlbut. Fuzzy Hashing for Digital Forensic Investigators. Technical report, Access Data Inc., http://accessdata.com/downloads/media/Fuzzy_Hashing_for_Investigators.p%df. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  22. Amazon.com Inc. Amazon AppStore for Android. http://www.amazon.com/mobile-apps/b?ie=UTF8&node=2350149011. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  23. Apple Inc. Apple App Store for IPhone. http://www.apple.com/iphone/apps-for-iphone/. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  24. Google Inc. Admob for Android Developers. http://developer.admob.com/wiki/Android. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  25. Google Inc. Android Dvelopment Guide: Signing Your Applications. http://developer.android.com/guide/publishing/app-signing.html. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  26. Google Inc. Android Market. https://market.android.com/. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  27. Lookout Inc. App Genome Report: February 2011. https://www.mylookout.com/appgenome/. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  28. Lookout Inc. Security Alert: Geinimi, Sophisticated New Android Trojan Found in Wild. http://blog.mylookout.com/2010/12/geinimi_trojan/. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  29. Lookout Inc. Update: Security Alert: DroidDream Malware Found in Official Android Market. http://blog.mylookout.com/2011/03/security-alert-malware-found-in_offic%ial-android-market-droiddream/. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  30. Symantec Inc. Android Threats Getting Steamy. http://www.symantec.com/connect/blogs/android-threats-getting-steamy. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  31. Wooboo Inc. How to add Wooboo advertisement SDK into Android. http://admin.wooboo.com.cn:9001/cbFiles/down/1272545843644.swf. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  32. Xuxian Jiang. Security Alert: New Sophisticated Android Malware DroidKungFu Found in Alternative Chinese App Markets. http://www.csc.ncsu.edu/faculty/jiang/DroidKungFu.html. Online; accessed at Sep 17, 2011.Google ScholarGoogle Scholar
  33. Jesse Kornblum. Identifying Almost Identical Files Using Context Triggered Piecewise Hashing. DFRWS '06, 2006.Google ScholarGoogle Scholar
  34. Greg Kumparak. TechCrunch: Android Now Seeing 550,000 Activations Per Day. http://techcrunch.com/2011/07/14/android-now-seeing-550000-activations-per-day/. Online; accessed at Sep 15, 2011.Google ScholarGoogle Scholar
  35. Kaspersky Lab. First SMS Trojan Detected for Smartphones Running Android. http://www.kaspersky.com/about/news/virus/2010/First_SMS_Trojan_detected_for_smartphones_running_Android. Online; Accessed at May 17, 2011.Google ScholarGoogle Scholar
  36. Ginger Myles and Christian Collberg. K-gram Based Software Birthmarks. In Proceedings of the 2005 ACM Symposium on Applied Computing, SAC '05, pages 314--318, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Mohammad Nauman, Sohail Khan, and Xinwen Zhang. Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Machigar Ongtang, Stephen McLaughlin, William Enck, and Patrick McDaniel. Semantically Rich Application-Centric Security in Android. In Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC '09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Saul Schleimer, Daniel S. Wilkerson, and Alex Aiken. Winnowing: Local Algorithms for Document Fingerprinting. In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD '03, pages 76--85, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. New York Times. Angry Birds, Flocking to Cellphones Everywhere. http://www.nytimes.com/2010/12/12/technology/12birds.htm. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  41. Xinran Wang, Chi-Chun Pan, Peng Liu, and Sencun Zhu. SigFree: a Signature-Free Buffer Overflow Attack Blocker. In Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, 2006. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Youmi.net. Wiki - Youmi Android Banner Version 2.1. http://wiki.youmi.net/wiki/Youmi_Android_Banner_Version_2.1. Online; accessed at May 17, 2011.Google ScholarGoogle Scholar
  43. Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12, February 2012.Google ScholarGoogle Scholar
  44. Yajin Zhou, Xinwen Zhang, Xuxian Jiang, and Vince Freeh. Taming Information-Stealing Smartphone Applications (on Android). In Proceeding of the 4th International Conference on Trust and Trustworthy Computing, TRUST '11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Detecting repackaged smartphone applications in third-party android marketplaces

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CODASPY '12: Proceedings of the second ACM conference on Data and Application Security and Privacy
            February 2012
            338 pages
            ISBN:9781450310918
            DOI:10.1145/2133601

            Copyright © 2012 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 7 February 2012

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            CODASPY '12 Paper Acceptance Rate21of113submissions,19%Overall Acceptance Rate149of789submissions,19%

            Upcoming Conference

            CODASPY '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader