A new similarity detection scheme based on hierarchical SimHash algorithm was proposed.The scheme extractd contents from different aspects to represent the APK file
then used the improved SimHash to respectively represent the file.The scheme analyzed the APK file by extracting the AndroidManifest.xml file in it
the sum of the Smali code from the decompilation of dex file
instructions extracted in Smali files
Java code set
and instructions extracted in Java code files.Through the study of Voted Perceptron voting algorithm
the scheme used trust weight method
by valuating a trust weight in every layer
then combined all the result with weight in every layer as a resule of scheme
the result can be more reasonable and more convincing.
关键词
Keywords
references
YAN Q , LI Y , LI T , et al . Insights into malware detection and prevention on mobile phones [C ] // Security Technology - International Conference,Sectech 2009,Held As . DBLP , 2009 : 242 - 249 .
CHANDRAMOHAN M , TAN H B K . Detection of mobile malware in the wild [J ] . Computer , 2012 , 45 ( 9 ): 65 - 71 .
UDDIN M S , ROY C K , SCHNEIDER K A , et al . On the effectiveness of SimHash for detecting near-miss clones in large scale software systems [C ] // Working Conference on Reverse Engineering . IEEE , 2011 : 13 - 22 .
BUYRUKBILEN S , BAKIRAS S . Secure similar document detection with SimHash [M ] // Secure Data Management . 2014 : 61 - 75 .
MANKU G S , JAIN A , SARMA A D . Detecting near-duplicates for web crawling [C ] // International Conference on World Wide Web . ACM , 2007 : 141 - 150 .
ZHOU L Q , WEI W X . Intrusion detectin method based on principal component analysis and SimHash [J ] . Computer and Digital Engineering , 2015 ( 7 ): 1291 - 1294 .
FREUND Y , SCHAPIRE R E . large margin classification using the perceptron algorithm [J ] . Machine Learning , 1999 , 37 ( 3 ): 277 - 296 .
UDDIN M S , ROY C K , SCHNEIDER K A , et al . On the effectiveness of SimHash for detecting near-miss clones in large scale software systems [C ] // Working Conference on Reverse Engineering . IEEE , 2011 : 13 - 22 .