Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Clone detection to prevent software piracy in android play store

View through CrossRef
Android is currently one of the most popular smartphone operating systems. Many application developers have been enticed by the enormous demand for mobile smartphone devices. The availability of reverse engineering tools for Android applications, however, also attracted virus authors' and plagiarists' attention. Cloning of applications has been a significant challenge to the Android market in recent years. However, Android accounts for the lion's share of all mobile malware globally, and its security vulnerabilities have garnered a lot of public attention. In this research, we look into how to recognize known Android malware using a clone detector. We compile a set of Android programs known to be malicious as well as a set of good programs. NiCad, a near-miss clone detector, is used to locate the classes of clones in a small fraction of the malicious programs after we retrieve the Java source code from the dex (Dalvik Executable file) file of the applications. The remaining malicious programs' source files are then searched for using these clone classes as a signature. As a control group, the non-harmful collection is utilized. In our analysis, we were able to decompile over 100 potentially harmful programs from 19 different malware families. According to our findings, a small sample of malicious programs can be used as a training set to detect 95% of known malware with a 96.88% accuracy rate and extremely few false positives. Our technique can successfully and consistently identify detrimental programs that are part of specific malware families. Moreover, illegal distribution is another part of software piracy, which is also a prevalent issue in the IT industry. We described an algorithm for the Android library licensing improvement to give insights to a developer on enhancing security measures to prevent the illegal distribution of individual Android applications.
Title: Clone detection to prevent software piracy in android play store
Description:
Android is currently one of the most popular smartphone operating systems.
Many application developers have been enticed by the enormous demand for mobile smartphone devices.
The availability of reverse engineering tools for Android applications, however, also attracted virus authors' and plagiarists' attention.
Cloning of applications has been a significant challenge to the Android market in recent years.
However, Android accounts for the lion's share of all mobile malware globally, and its security vulnerabilities have garnered a lot of public attention.
In this research, we look into how to recognize known Android malware using a clone detector.
We compile a set of Android programs known to be malicious as well as a set of good programs.
NiCad, a near-miss clone detector, is used to locate the classes of clones in a small fraction of the malicious programs after we retrieve the Java source code from the dex (Dalvik Executable file) file of the applications.
The remaining malicious programs' source files are then searched for using these clone classes as a signature.
As a control group, the non-harmful collection is utilized.
In our analysis, we were able to decompile over 100 potentially harmful programs from 19 different malware families.
According to our findings, a small sample of malicious programs can be used as a training set to detect 95% of known malware with a 96.
88% accuracy rate and extremely few false positives.
Our technique can successfully and consistently identify detrimental programs that are part of specific malware families.
Moreover, illegal distribution is another part of software piracy, which is also a prevalent issue in the IT industry.
We described an algorithm for the Android library licensing improvement to give insights to a developer on enhancing security measures to prevent the illegal distribution of individual Android applications.

Related Results

Software Piracy Protection
Software Piracy Protection
ABSTRACT : Software piracy has been major issue for software industries. Piracy has become so prevalent over the Internet that poses a major threat to software product companies. ...
Factors motivating people toward pirated software
Factors motivating people toward pirated software
PurposeThe costs of software piracy are enormous. According to Business Software Alliance, it was estimated that the software industry lost $34 billion globally due to software pir...
The Question of Pirate Trials in States Without a Crime of Piracy
The Question of Pirate Trials in States Without a Crime of Piracy
Abstract Many States in the world such as China have no specific domestic laws providing for the crime of piracy, leading to the question whether these States have t...
MARITIME PIRACY: THREATS AND CHALLENGES FOR SHIPPING
MARITIME PIRACY: THREATS AND CHALLENGES FOR SHIPPING
The article highlights piracy as a global problem for shipping in the modern period. The study of the problem of maritime piracy is important for developing security strategies and...
Software Piracy in Nigeria
Software Piracy in Nigeria
The enormity of software piracy varies in different countries and Nigeria is not an exception. Software piracy occurs in diverse forms such as soft lifting, hard disk loading, coun...
Price, Piracy, and Search: Which Pirates Respond to Changes in the Legal Price?
Price, Piracy, and Search: Which Pirates Respond to Changes in the Legal Price?
Prior research suggests that high prices may motivate the decision to pirate entertainment goods. We analyzed a natural experiment that decreased the tax rate, and hence also the n...
Piracy
Piracy
International law, it might be argued, is a legal system directed toward the defeat or suppression of a category of violators known as “enemies of mankind,” or hosti humanis generi...
Android Malware Detection Techniques: A Literature Review
Android Malware Detection Techniques: A Literature Review
Objective: This paper provides the basics of Android malware, its evolution and tools and techniques for malware analysis. Its main aim is to present a review of the literature on ...

Back to Top