Measuring similarity of android applications via reversing and K-gram birthmarking

RACS '13: Proceedings of the 2013 Research in Adaptive and Convergent Systems(2013)

引用 8|浏览0
暂无评分
摘要
By measuring similarity of programs, we can determine whether someone illegally copies a program from another program or not. If the similarity is significantly high, it means that a program is a copy of the other. This paper proposes three techniques to measure similarity of the Dalvik executable codes (DEXs) in the Android application Packages (APKs). Firstly, we decompile the DEXs of candidate applications into Java sources and compute the similarity between the decompiled sources. Secondly, candidate DEXs are disassembled and the similarities between disassembled codes are measured. Finally, we extract k-gram based software birthmark form the dissembled codes and calculate the similarity of sample DEXs by comparing the extracted birthmarks. We perform several experiments to identify effects of the three techniques. With the analysis of the experimental results, the advantages and disadvantages of each technique are discussed.
更多
查看译文
关键词
disassembled code,dalvik executable code,decompiled source,candidate application,k-gram birthmarking,android application packages,sample dexs,candidate dexs,android application,dissembled code,java source
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要