IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification

被引:8
作者
Ullah, Farhan [1 ]
Naeem, Muhammad Rashid [2 ]
Bajahzar, Abdullah S. [3 ]
Al-Turjman, Fadi [4 ]
机构
[1] Northwestern Polytech Univ, Sch Software, 127 West Youyi Rd, Xian 710072, Shaanxi, Peoples R China
[2] Leshan Normal Univ, Sch Artificial Intelligence, 78 Binhe Rd, Leshan 614000, Sichuan, Peoples R China
[3] Majmaah Univ, Coll Sci Zulfi, Dept Comp Sci & Informat, POB 1712, Zulfi 11932, Saudi Arabia
[4] Near East Univ, Res Ctr AI & IoT, Artificial Intelligence Dept, Near East Blvd,Mersin 10, TR-99138 Nicosia, Trnc, Turkey
关键词
Clone detection; deep learning; program dependency graph; cloud services; Internet of Things; INTERNET;
D O I
10.1145/3418206
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software piracy is an act of illegal stealing and distributing commercial software either for revenue or identify theft. Pirated applications on Android app stores are harming developers and their users by clone scammers. The scammers usually generate pirated versions of the same applications and publish them in different open-source app stores. There is no centralized system between these app stores to prevent scammers from publishing pirated applications. As most of the app stores are hosted on cloud storage, therefore a cloud-based interaction system can prevent scammers from publishing pirated applications. In this paper, we proposed IoT-based cloud architecture for clone detection using program dependency analysis. First, the newly submitted APK and possible original files are selected from app stores. The APK Extractor and JDEX decompiler extract APK and DEX files for Java source code analysis. The dependency graphs of Java files are generated to extract a set of weighted features. The Stacked-Long Short-Term Memory (S-LSTM) deep learning model is designed to predict possible clones. Experimental results have shown that the proposed approach can achieve an average accuracy of 95.48% among clones from different application stores.
引用
收藏
页数:17
相关论文
共 39 条
[1]  
Abd-El-Hafiz S. K., 2011, METRICS BASED DATA M
[2]  
Agostinelli F., 2014, arXiv preprint arXiv:1412.6830
[3]  
Buch L., 2019, LEARNING BASED RECUR
[4]  
Cartwright R, 1989, The semantics of program dependence
[5]  
Chahid Y, 2017, INTERNET THINGS SECU
[6]   Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets [J].
Chen, Kai ;
Liu, Peng ;
Zhang, Yingjun .
36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, :175-186
[7]  
Chin E., 2011, ANAL INTERAPPLICATIO
[8]  
Crussell J, 2013, SCALABLE SEMANTICS B
[9]  
Desnos Anthony., 2013, Androguard: Reverse engineering, malware and goodware analysis of android applications
[10]  
Eddy B. P, 2013, EVALUATING SOURCE CO