Plagiarizing smartphone applications: attack strategies and defense techniques

  • Authors:
  • Rahul Potharaju;Andrew Newell;Cristina Nita-Rotaru;Xiangyu Zhang

  • Affiliations:
  • Department of Computer Science, Purdue University, IN;Department of Computer Science, Purdue University, IN;Department of Computer Science, Purdue University, IN;Department of Computer Science, Purdue University, IN

  • Venue:
  • ESSoS'12 Proceedings of the 4th international conference on Engineering Secure Software and Systems
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we show how an attacker can launch malware onto a large number of smartphone users by plagiarizing Android applications and by using elements of social engineering to increase infection rate. Our analysis of a dataset of 158,000 smartphone applications meta-information indicates that 29.4% of the applications are more likely to be plagiarized. We propose three detection schemes that rely on syntactic fingerprinting to detect plagiarized applications under different levels of obfuscation used by the attacker. Our analysis of 7,600 smartphone application binaries shows that our schemes detect all instances of plagiarism from a set of real-world malware incidents with 0.5% false positives and scale to millions of applications using only commodity servers.