Ontology type: schema:Chapter Open Access: True
2013
AUTHORSSteve Hanna , Ling Huang , Edward Wu , Saung Li , Charles Chen , Dawn Song
ABSTRACTMobile application markets such as the Android Marketplace provide a centralized showcase of applications that end users can purchase or download for free onto their mobile phones. Despite the influx of applications to the markets, applications are cursorily reviewed by marketplace maintainers due to the vast number of submissions. User policing and reporting is the primary method to detect misbehaving applications. This reactive approach to application security, especially when programs can contain bugs, malware, or pirated (inauthentic) code, puts too much responsibility on the end users. In light of this, we propose Juxtapp, a scalable infrastructure for code similarity analysis among Android applications. Juxtapp provides a key solution to a number of problems in Android security, including determining if apps contain copies of buggy code, have significant code reuse that indicates piracy, or are instances of known malware. We evaluate our system using more than 58,000 Android applications and demonstrate that our system scales well and is effective. Our results show that Juxtapp is able to detect: 1) 463 applications with confirmed buggy code reuse that can lead to serious vulnerabilities in real-world apps, 2) 34 instances of known malware and variants (13 distinct variants of the GoldDream malware), and 3) pirated variants of a popular paid game. More... »
PAGES62-81
Detection of Intrusions and Malware, and Vulnerability Assessment
ISBN
978-3-642-37299-5
978-3-642-37300-8
http://scigraph.springernature.com/pub.10.1007/978-3-642-37300-8_4
DOIhttp://dx.doi.org/10.1007/978-3-642-37300-8_4
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1031121749
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Computation Theory and Mathematics",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "UC Berkeley, USA",
"id": "http://www.grid.ac/institutes/grid.47840.3f",
"name": [
"UC Berkeley, USA"
],
"type": "Organization"
},
"familyName": "Hanna",
"givenName": "Steve",
"id": "sg:person.07741311617.07",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07741311617.07"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Intel Labs, USA",
"id": "http://www.grid.ac/institutes/grid.419318.6",
"name": [
"Intel Labs, USA"
],
"type": "Organization"
},
"familyName": "Huang",
"givenName": "Ling",
"id": "sg:person.012522703103.43",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012522703103.43"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "UC Berkeley, USA",
"id": "http://www.grid.ac/institutes/grid.47840.3f",
"name": [
"UC Berkeley, USA"
],
"type": "Organization"
},
"familyName": "Wu",
"givenName": "Edward",
"type": "Person"
},
{
"affiliation": {
"alternateName": "UC Berkeley, USA",
"id": "http://www.grid.ac/institutes/grid.47840.3f",
"name": [
"UC Berkeley, USA"
],
"type": "Organization"
},
"familyName": "Li",
"givenName": "Saung",
"type": "Person"
},
{
"affiliation": {
"alternateName": "UC Berkeley, USA",
"id": "http://www.grid.ac/institutes/grid.47840.3f",
"name": [
"UC Berkeley, USA"
],
"type": "Organization"
},
"familyName": "Chen",
"givenName": "Charles",
"type": "Person"
},
{
"affiliation": {
"alternateName": "UC Berkeley, USA",
"id": "http://www.grid.ac/institutes/grid.47840.3f",
"name": [
"UC Berkeley, USA"
],
"type": "Organization"
},
"familyName": "Song",
"givenName": "Dawn",
"id": "sg:person.01143152610.86",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01143152610.86"
],
"type": "Person"
}
],
"datePublished": "2013",
"datePublishedReg": "2013-01-01",
"description": "Mobile application markets such as the Android Marketplace provide a centralized showcase of applications that end users can purchase or download for free onto their mobile phones. Despite the influx of applications to the markets, applications are cursorily reviewed by marketplace maintainers due to the vast number of submissions. User policing and reporting is the primary method to detect misbehaving applications. This reactive approach to application security, especially when programs can contain bugs, malware, or pirated (inauthentic) code, puts too much responsibility on the end users. In light of this, we propose Juxtapp, a scalable infrastructure for code similarity analysis among Android applications. Juxtapp provides a key solution to a number of problems in Android security, including determining if apps contain copies of buggy code, have significant code reuse that indicates piracy, or are instances of known malware. We evaluate our system using more than 58,000 Android applications and demonstrate that our system scales well and is effective. Our results show that Juxtapp is able to detect: 1) 463 applications with confirmed buggy code reuse that can lead to serious vulnerabilities in real-world apps, 2) 34 instances of known malware and variants (13 distinct variants of the GoldDream malware), and 3) pirated variants of a popular paid game.",
"editor": [
{
"familyName": "Flegel",
"givenName": "Ulrich",
"type": "Person"
},
{
"familyName": "Markatos",
"givenName": "Evangelos",
"type": "Person"
},
{
"familyName": "Robertson",
"givenName": "William",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-642-37300-8_4",
"inLanguage": "en",
"isAccessibleForFree": true,
"isPartOf": {
"isbn": [
"978-3-642-37299-5",
"978-3-642-37300-8"
],
"name": "Detection of Intrusions and Malware, and Vulnerability Assessment",
"type": "Book"
},
"keywords": [
"code reuse",
"Android applications",
"end users",
"significant code reuse",
"real-world apps",
"mobile application market",
"application security",
"scalable infrastructure",
"Android marketplace",
"Android security",
"buggy code",
"scalable system",
"serious vulnerabilities",
"application market",
"malware",
"mobile phones",
"reactive approach",
"key solution",
"users",
"reuse",
"security",
"apps",
"number of problems",
"vast number",
"code",
"applications",
"similarity analysis",
"instances",
"phones",
"system",
"infrastructure",
"bugs",
"maintainers",
"piracy",
"game",
"showcase",
"marketplace",
"submission",
"vulnerability",
"primary method",
"number",
"solution",
"market",
"method",
"variants",
"program",
"copies",
"results",
"reporting",
"analysis",
"responsibility",
"policing",
"light",
"influx",
"problem",
"approach"
],
"name": "Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications",
"pagination": "62-81",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1031121749"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-642-37300-8_4"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-642-37300-8_4",
"https://app.dimensions.ai/details/publication/pub.1031121749"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-05-10T10:53",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/chapter/chapter_449.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/978-3-642-37300-8_4"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-37300-8_4'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-37300-8_4'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-37300-8_4'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-37300-8_4'
This table displays all metadata directly associated to this object as RDF triples.
161 TRIPLES
23 PREDICATES
82 URIs
75 LITERALS
7 BLANK NODES