DriodRC:基于资源和代码的Android应用重打包检测方法  

DriodRC:Android application repackaging detection method based on resources and codes

在线阅读下载全文

作  者:柴源 袁倩婷 欧帆 徐建[1] Chai Yuan;Yuan Qianting;Ou Fan;Xu Jian(School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,China)

机构地区:[1]南京理工大学计算机科学与工程学院,江苏南京210094

出  处:《南京理工大学学报》2024年第3期328-334,383,共8页Journal of Nanjing University of Science and Technology

摘  要:由于Android系统的开放性,应用市场中有着大量的重打包应用程序,对开发者的利益和用户的安全隐私造成了威胁。该文提出一种基于资源和代码的Android应用重打包检测方法,以Android应用程序包(APK)中的资源和代码为分析对象,从资源角度提出了一种基于R文件匹配的粗粒度检测方法,对于可疑的APK对,进一步采用基于代码的细粒度检测方法识别重打包应用。在真实的Android应用数据集上开展试验,结果表明提出的方法的检测准确率达99.58%,优于现有的其他方法,且具有较快的检测速度,适合于大规模应用重打包检测。Due to the openness of the Android system,there are a large number of repackaged applications in the application market,which poses a threat to the interests of developers and the security and privacy of users.This paper proposes an Android application repackaging detection method based on resources and codes.Taking the resources and codes in the Android application package(APK)as the analysis objects,from the perspective of resources,a coarse-grained detection method based on R file matching is proposed.For suspicious APK pairs,a code-based fine-grained detection method is further used to identify repackaged applications.Experiments are carried out on real Android application datasets.The results show that the detection accuracy of the proposed method is 99.58%,which is better than other existing methods,and has a faster detection speed,which is suitable for large-scale application repackaging detection.

关 键 词:资源 代码 粗粒度检测 细粒度检测 

分 类 号:TP391[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象