DroidSD: An Efficient Indexed Based Android Applications Similarity Detection Tool

被引:4
作者
Akram, Junaid [1 ]
Shi, Zhendong [1 ]
Mumtaz, Majid [1 ]
Luo, Ping [1 ]
机构
[1] Tsinghua Univ, Sch Software, Key Lab Informat Syst Secur, Beijing 100084, Peoples R China
关键词
clone detection; maintaining APK code; Android apps re-usability; plagiarism detection; Apps similarity detection; information security; CODE CLONE;
D O I
10.6688/JISE.202001_36(1).0002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android is becoming more and more popular in recent years. Meanwhile, it has been noticed that the security threats are also increasing with the passage of time because of the code reuse from other applications. In this paper, we propose and design DroidSD, a clone detection tool for Android applications, that helps to detect different types of code clones from APK's source code. A prototype has been developed and implemented to detect clones in Android applications. DroidSD detects Type-1, Type-2 and Type-3 (near-miss) clones in Android applications at the source code level with high accuracy rate, which was not possible in previous Android similarity detection techniques. DroidSD can detect full and partial level similarity between applications. We evaluate DroidSD on real time data-set and count the Recall and Precision on BigCloneBench, which is quite significant. The real time data-set includes 30,500 Android applications including top one, i.e. Chrome, Firefox, Gmail, WhatsApp, GoogleMap, Google-PlayStore, Baidu and BigCloneBench.
引用
收藏
页码:13 / 29
页数:17
相关论文
共 26 条
[1]   VCIPR: Vulnerable Code is Identifiable When a Patch is Released (Hacker's Perspective) [J].
Akram, Junaid ;
Liang, Qi ;
Ping, Luo .
2019 IEEE 12TH CONFERENCE ON SOFTWARE TESTING, VALIDATION AND VERIFICATION (ICST 2019), 2019, :402-413
[2]   DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level [J].
Akram, Junaid ;
Shi, Zhendong ;
Mumtaz, Majid ;
Ping, Luo .
2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2018, :100-105
[3]  
Akram Junaid, 2018, P SEKE 2018 30 INT C, P354
[4]  
Alam S, 2016, INT CONF DIGIT INFO, P79, DOI 10.1109/DICTAP.2016.7544005
[5]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[6]   An Empirical Evaluation of Security Indicators in Mobile Web Browsers [J].
Amrutkar, Chaitrali ;
Traynor, Patrick ;
van Oorschot, Paul C. .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (05) :889-903
[7]  
[Anonymous], INT J COMPUT APPL
[8]  
[Anonymous], INT J INFORM COMPUTE
[9]  
[Anonymous], GSTF J COMPUTING
[10]  
[Anonymous], IET INFORM SECURITY