skip to main content
10.1145/3106237.3121277acmconferencesArticle/Chapter ViewAbstractPublication PagesfseConference Proceedingsconference-collections
short-paper

DecisionDroid: a supervised learning-based system to identify cloned Android applications

Published:21 August 2017Publication History

ABSTRACT

This study presents DecisionDroid, a supervised learning based system to identify cloned Android app pairs. DecisionDroid is trained using a manually verified diverse dataset of 12,000 Android app pairs. On a hundred ten-fold cross validations, DecisionDroid achieved 97.9% precision, 98.3% recall, and 98.4% accuracy.

References

  1. Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, and Yves Le Traon. 2016. AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Conference on Mining Software Repositories (MSR ’16). 468–471. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. AppBrain. 2017.Google ScholarGoogle Scholar
  3. Number of Android apps. https://www.appbrain.com/stats/number-of-android-apps. (2017).Google ScholarGoogle Scholar
  4. Amiangshu Bosu, Fang Liu, Danfeng (Daphne) Yao, and Gang Wang. 2017. Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS ’17). 71–85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Kai Chen, Peng Liu, and Yingjun Zhang. 2014. Achieving accuracy and scalability simultaneously in detecting application clones on android markets. In Proceedings of the 36th International Conference on Software Engineering. ACM, 175–186. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jonathan Crussell, Clint Gibler, and Hao Chen. 2012. Attack of the clones: Detecting cloned applications on android markets. In European Symposium on Research in Computer Security. Springer, 37–54.Google ScholarGoogle ScholarCross RefCross Ref
  7. Jonathan Crussell, Clint Gibler, and Hao Chen. 2013. Andarwin: Scalable detection of semantically similar android applications. In European Symposium on Research in Computer Security. Springer, 182–199.Google ScholarGoogle ScholarCross RefCross Ref
  8. Olga Gadyatskaya, Andra-Lidia Lezza, and Yury Zhauniarovich. 2016. Evaluation of Resource-Based App Repackaging Detection in Android. In Nordic Conference on Secure IT Systems. Springer, 135–151.Google ScholarGoogle Scholar
  9. Isabelle Guyon, Jason Weston, Stephen Barnhill, and Vladimir Vapnik. 2002. Gene selection for cancer classification using support vector machines. Machine learning 46, 1 (2002), 389–422. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, and Dawn Song. 2012. Juxtapp: A scalable system for detecting code reuse among android applications. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 62–81. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. International Data Corporation (IDC). 2016. Smartphone OS Market Share, 2016 Q3. http://www.idc.com/promo/smartphone-market-share/os. (2016).Google ScholarGoogle Scholar
  12. Li Li, Daoyuan Li, Tegawendé F Bissyandé, Jacques Klein, Yves Le Traon, David Lo, and Lorenzo Cavallaro. 2017. Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics & Security (TIFS) (2017). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825–2830. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Tiago P Peixoto. 2014. The graph-tool python library. figshare (2014).Google ScholarGoogle Scholar
  15. Payam Refaeilzadeh, Lei Tang, and Huan Liu. 2009. Cross-validation. In Encyclopedia of database systems. Springer, 532–538.Google ScholarGoogle Scholar
  16. Yuru Shao, Xiapu Luo, Chenxiong Qian, Pengfei Zhu, and Lei Zhang. 2014. Towards a scalable resource-driven approach for detecting repackaged android applications. In Proceedings of the 30th Annual Computer Security Applications Conference. ACM, 56–65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Mingshen Sun, Mengmeng Li, and John Lui. 2015. Droideagle: seamless detection of visually similar android apps. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM, 9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Haoyu Wang, Yao Guo, Ziang Ma, and Xiangqun Chen. 2015. Wukong: a scalable and accurate two-phase approach to android app clone detection. In Proceedings of the 2015 International Symposium on Software Testing and Analysis. ACM, 71–82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu, and Peng Liu. 2014. ViewDroid: Towards obfuscation-resilient mobile application repackaging detection. In Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks. ACM, 25–36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La Spina, and Ermanno Moser. 2014. FSquaDRA: fast detection of repackaged applications. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 130–145. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Min Zheng, Mingshen Sun, and John CS Lui. 2013. Droid analytics: a signature based analytic system to collect, extract, analyze and associate android malware. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on. IEEE, 163–171. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang, and Shihong Zou. 2013. Fast, scalable detection of piggybacked mobile applications. In Proceedings of the third ACM conference on Data and application security and privacy. ACM, 185–196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Wu Zhou, Yajin Zhou, Xuxian Jiang, and Peng Ning. 2012. Detecting repackaged smartphone applications in third-party android marketplaces. In Proceedings of the second ACM conference on Data and Application Security and Privacy. ACM, 317–326. Abstract 1 Problem and Motivation 2 Related Work 3 Approach and Uniqueness 3.1 Training Dataset Generation 3.2 DecisionDroid Architecture 4 Results and Contributions References Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. DecisionDroid: a supervised learning-based system to identify cloned Android applications

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ESEC/FSE 2017: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering
          August 2017
          1073 pages
          ISBN:9781450351058
          DOI:10.1145/3106237

          Copyright © 2017 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 August 2017

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          Overall Acceptance Rate112of543submissions,21%

          Upcoming Conference

          FSE '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader