Due to open source policy, Android systems are exposed to a variety of security problems. In particular, app reuse attacks are detrimental threat to the Android system security. This is because attacker can create core malign components and quickly generate a bunch of malicious apps by reusing these components. Hence, it is very imperative to discern whether Android apps contain reused components. To meet this need, we propose an Android app reuse analysis technique based on the Sequential Hypothesis Testing. This technique quickly makes a decision with a few number of samples whether a set of Android apps is made through app reuse. We performed experimental study with 6 malicious app groups, 1 google and 1 third-party app group such that each group consists of 100 Android apps. Experimental results demonstrate that our proposed analysis technique efficiently judges Android app groups with reused components.
목차
Abstract 1. Introduction 2. Related Work 3. App Reuse Analysis using the SHT 4. Experimental Study 4.1. Experiment Environments 4.2. Experiment Results 5. Conclusions Acknowledgement References
키워드
Androidapp reusesequential hypothesis testing
저자
Jun-Won Ho [ Department of Information Security Seoul Women’s University 621 Hwarangro, Nowon-Gu, Seoul, South Korea ]