浏览全部资源
扫码关注微信
1. 华中科技大学计算机学院,湖北 武汉 430074
2. 北京航空精密机械研究所,北京 100876
[ "杨佳(1993- ),女,湖北武汉人,华中科技大学博士生,主要研究方向为网络空间安全中的恶意代码的克隆搜索、恶意代码在移动互联网中的传播以及大数据的隐私保护。" ]
[ "付才(1976- ),男,湖北武汉人,博士,华中科技大学教授,主要研究方向为移动网络安全、路由器算法以及分布式计算。" ]
[ "韩兰胜(1973- ),男,湖北武汉人,博士,华中科技大学副教授,主要研究方向为网络安全、恶意代码检测以及大数据安全。" ]
[ "鲁宏伟(1964- ),男,湖北武汉人,博士,华中科技大学教授,主要研究方向为网络空间安全、IoT、社交网络、安全协议分析。" ]
[ "刘京亮(1984- ),男,北京人,北京航空精密机械研究所高级工程师,主要研究方向为非接触测量方法、测量机软件工程、智能检测技术。" ]
网络出版日期:2019-08,
纸质出版日期:2019-08-25
移动端阅览
杨佳, 付才, 韩兰胜, 等. 云环境下基于函数编码的移动应用克隆检测[J]. 通信学报, 2019,40(8):60-71.
Jia YANG, Cai FU, Lansheng HAN, et al. Function encoding based approach for App clone detection in cloud environment[J]. Journal on communications, 2019, 40(8): 60-71.
杨佳, 付才, 韩兰胜, 等. 云环境下基于函数编码的移动应用克隆检测[J]. 通信学报, 2019,40(8):60-71. DOI: 10.11959/j.issn.1000-436x.2019106.
Jia YANG, Cai FU, Lansheng HAN, et al. Function encoding based approach for App clone detection in cloud environment[J]. Journal on communications, 2019, 40(8): 60-71. DOI: 10.11959/j.issn.1000-436x.2019106.
提出了一种云环境下基于汇编函数层编码的App克隆检测方法,实现了Android应用克隆检测原型系统Pentagon。首先,针对App执行文件代码设计了二进制函数基本代码块特征提取方法;其次,提出了一种对二进制函数进行单调编码的算法,基于图形嵌入原理,融合执行流程图与函数代码基本块特征,形成每个函数代码的投影特征;最后,提出了一种高效的第三方库函数过滤方法,进一步提升了克隆检测效果。实验证明,所提方法具有97.6%的准确率,在实验条件下判定一个App克隆对只需要79 ms,能够支撑云环境下应用市场级别的大规模克隆检测。
An efficient function-based encoding scheme in the cloud environment for detecting the cloned Apps was designed
called Pentagon.Firstly
a basic block feature extraction method was proposed.Secondly
a monotonic encoding algorithm for the App function was designed
which encoded the function based on the control flow graph structure and basic block attributes.Finally
a three-party libraries filtering method was proposed by using an efficient clustering algorithm based on the function feature.Experiments verified the effectiveness of the proposed scheme.The average search time is close to 79 ms
and the clone detection accuracy achieves 97.6%.
CHEN Y , GAN L , ZHANG S . Plagiarism detection in homework based on image hashing [C ] // The Third International Conference of Pioneering Computer Scientists,Engineers and Educator . ICPCSEE , 2017 : 424 - 432 .
ANDREWS S , VARUNBABU B S , SUBASH U . Finding the high probabilistic potential fishing zone by accelerated SVM classification [J ] . International Journal of Information and Communication Technology , 2017 , 11 ( 4 ): 576 - 585 .
PAPALEXAKIS E E , FALOUTSOS C , SIDIROPOULOS ND . Tensors for data mining and data fusion:models,applications and scalable algorithms [J ] . ACM Transaction Intelligence,System,Technology , 2017 , 8 ( 16 ): 1 - 4 .
FU D , XU Y . WASTK:a weighted abstract syntax tree kernel method for source code plagiarism detection [J ] . Scientific Programming , 2017 : 1 - 8 .
FANG L , LIN Y , YANG J . An efficient and packing-resilient two-phase Android cloned application detection approach [J ] . Mobile Information Systems , 2017 : 1 - 12 .
DU Y , WANG J LI Q . An Android malware detection approach using community structures of weighted function call graphs [J ] .,2017:1. IEEE Access , 2017 :1.
LYU F , LIN Y , YANG J . Suidroid:an efficient hardening-resilient approach to Android App clone detection [C ] // 2016 IEEE Trustcom BigdataSE ISPA . IEEE , 2016 : 511 - 518 .
SIVIC J , ZISSERMAN A , . Video google:a text retrieval approach to object matching in videos [C ] // The Ninth IEEE International Conference on Computer Vision . IEEE , 2003 : 1470 - 1477 .
SOH C , TAN H B K , ARNAATOVICH Y L . Detecting clones in Android applications through analyzing user interfaces [C ] // 2015 IEEE 23rd International Conference on Program Comprehension . IEEE , 2015 : 163 - 173 .
CHEN Q , WANG J , WANG Y . An online approach for detecting repackaged Android applications based on multi-user collaboration [C ] // Ubiquitous Intelligence and Computing and 2015 IEEE International Conference on Autonomic and Trusted Computing . 2016 : 312 - 315 .
DREBIN A . Reverse engineering,malware and goodware analysis of Android applications and more [R ] . Technical Report , 2013 .
ZHAUNIAROVICH Y , GADYATSKAYA O , CRISPO B . Fsquadra:fast detection of repackaged applications [R ] . Working Conference on Data and Applications Security and Privacy , 2014 .
KHOO W , MYCROFT M A , ANDERSON R . Rendezvous:a search engine for binary code [C ] // The 10th Working Conference on Mining Software Repositories (MSR) . IEEE , 2013 : 329 - 338 .
PEWNY J , GARMANY B , GAWLIK R , et al . Cross-architecture bug search in binary executables [C ] // 2015 IEEE Symposium on Security and Privacy . IEEE , 2015 : 709 - 724 .
FENG Q , ZHOU R . Scalable graph-based bug search for malware images [C ] // The 2016 ACM SIGSA . 2016 : 480 - 491 .
ZHOU W , ZHOU Y,GRACEM . fast,scalable detection of piggy- backed mobile applications [C ] // The Third ACM Conference on Data and Application Security and Privacy . 2013 : 185 - 196 .
DAVID Y , YAHAV E . Tracelet-based code search in executables [C ] // The 35th ACM SIGPLAN Conference on Programming Language Design and Implementation . 2014 : 349 - 360 .
ARP D , SPREITZENBARTH M , HUBNER M . Drebin:effective and explainable detection of Android malware in your pocket [C ] // In Network and Distributed System Security Symposium . 2014 .
LUKAS W , MATTHIAS N , MARTINA L . Andrubis:Android malware under the magnifying glass [R ] . Vienna Univeristy of Technology , 2014 .
ENCK W , GILBERT P , CHUN B . Taintdroid:an information tracking system for realtime privacy monitoring on smartphones [C ] // The 9th USENIX Conference on Operating Systems Design and Implementation . 2010 : 393 - 407 .
TANG J QU M , . LINE:large-scale information network embedding [C ] // The 24th International Conference on World Wide Web . 2015 : 1067 - 1077 .
LIU Z , CHEN C . POSTER:neural network-based graph embedding for malicious accounts detection [C ] // The 2017 ACM CCS . 2017 : 2543 - 2545 .
CHEN K , LIU P , ZHANG Y . Achieving accuracy and scalability simultaneously in detecting application clones on android markets [C ] // 36th International Conference on Software Engineering . 2014 : 175 - 186 .
WANG H , GUO Y , MA Z . Wukong:a scalable and accurate two-phase approach to Android App clone detection [C ] // The 2015 Internatinal Symposium on Software,Testing and Analysis . ACM , 2015 : 71 - 82 .
0
浏览量
547
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构