Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2462456.2464461acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

AdRob: examining the landscape and impact of android application plagiarism

Published: 25 June 2013 Publication History

Abstract

Malicious activities involving Android applications are rising rapidly. As prior work on cyber-crimes suggests, we need to understand the economic incentives of the criminals to design the most effective defenses. In this paper, we investigate application plagiarism on Android markets at a large scale. We take the first step to characterize plagiarized applications and estimate their impact on the original application developers. We first crawled 265,359 free applications from 17 Android markets around the world and ran a tool to identify similar applications ("clones"). Based on the data, we examined properties of the cloned applications, including their distribution across different markets, application categories, and ad libraries. Next, we examined how cloned applications affect the original developers. We captured HTTP advertising traffic generated by mobile applications at a tier-1 US cellular carrier for 12 days. To associate each Android application with its advertising traffic, we extracted a unique advertising identifier (called the client ID) from both the applications and the network traces. We estimate a lower bound on the advertising revenue that cloned applications siphon from the original developers, and the user base that cloned applications divert from the original applications. To the best of our knowledge, this is the first large scale study on the characteristics of cloned mobile applications and their impact on the original developers.

References

[1]
A. Andoni and P. Indyk. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions". In: Foundations of Computer Science, 2006. FOCS'06. 47th Annual IEEE Symposium on. Ieee. 2006, pp. 459--468.
[2]
Jason Ankeny. Feds seize Android app marketplaces Applanet, AppBucket in piracy sting. Aug. 22, 2012. url: http://www.fiercemobilecontent.com/story/feds-seize-android-app-marketplaces-applanet-appbucket-piracy-sting/2012-08-22.
[3]
AppBrain. Android Ad networks. Mar. 2013. url: http://www.appbrain.com/stats/libraries/ad.
[4]
AppBrain. Number of available android applications. Nov. 2012. url: http://www.appbrain.com/stats/number-of-android-apps.
[5]
Brut.alll. Android-Apktool. url: http://code.google.com/p/android-apktool.
[6]
J. Crussell, C. Gibler, and H. Chen. Attack of the Clones: Detecting Cloned Applications on Android Markets". In: Computer Security--ESORICS 2012 (2012), pp. 37--54.
[7]
N. Daswani et al. Online advertising fraud". In: Crimeware: Understanding New Attacks and Defenses (2008).
[8]
M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D.S. Wallach. \Quire: lightweight provenance for smart phone operating systems". In: USENIX Security. 2011.
[9]
William Enck, Landon P. Cox, and Jaeyeon Jung. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones". In: (2010).
[10]
Jesus Freke. Smali/Baksmali. url: http://code.google.com/p/smali.
[11]
Mona Gandhi, Markus Jakobsson, and Jacob Ratkiewicz. \Badvertisements: Stealthy click-fraud with unwitting accessories". In: Online Fraud, Part I Journal of Digital Forensic Practice, Volume 1, Special Issue 2. 2006.
[12]
M.C. Grace, W. Zhou, X. Jiang, and A.R. Sadeghi. Unsafe exposure analysis of mobile in-app advertisements". In: Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks. ACM. 2012, pp. 101--112.
[13]
T. Holz, M. Engelberth, and F. Freiling. Learning more about the underground economy: A case-study of keyloggers and dropzones". In: Computer Security--ESORICS 2009 (2009), pp. 1--18.
[14]
Chris Kanich et al. Show Me the Money: Characterizing Spam-advertised Revenue". In: USENIX Security Symposium. San Francisco, CA, Aug. 2011.
[15]
Keystore and Aliases - is there a use to multiple aliases? Dec. 2012. url: http://stackoverflow.com/questions/2667399/keystore-and-aliases-is-there-a-use-to-multiple-aliases.
[16]
Eric Lafortune. Proguard. url: http://proguard.sourceforge.net.
[17]
Kirill Levchenko et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain". In: IEEE Symposium and Security and Privacy. Oakland, CA, May 2011.
[18]
H. Liu, C.N. Chuah, H. Zang, and S. Gatmir-motahari. Evolving Landscape of Cellular Network Traffic". In: Computer Communications and Networks (ICCCN), 2012 21st International Conference on. IEEE. 2012, pp. 1--7.
[19]
Multiple Signatures and Shared UIDs. Dec. 2012. url: https://groups.google.com/forum/?fromgroups=#!topic/android-security-discuss/LyyEWyFg5xc.
[20]
P. Pearce, A.P. Felt, G. Nunez, and D. Wagner. AdDroid: Privilege Separation for Applications and Advertisers in Android". In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. ACM. 2012.
[21]
Security Alert: Malware Found Targeting Custom ROMs (jSMSHider). Dec. 2012. url: https://blog.lookout.com/blog/2011/06/15/security-alert-malware-found-targeting-custom-roms-jsmshider/.
[22]
S. Shekhar, M. Dietz, and D.S. Wallach. Adsplit: Separating smartphone advertising from applications". In: CoRR, abs/1202.4030 (2012).
[23]
Signing Your Applications. Dec. 2012. url: http://developer.android.com/tools/publishing/app-signing.html.
[24]
R. Stevens, C. Gibler, J. Crussell, J. Erickson, and H. Chen. Investigating User Privacy in Android Ad Libraries". In: IEEE Mobile Security Technologies (MoST), San Francisco, CA (2012).
[25]
B. Stone-Gross, T. Holz, G. Stringhini, and G. Vigna. The underground economy of spam: A botmasters perspective of coordinating large-scale spam campaigns". In: USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). 2011.
[26]
B. Stone-Gross et al. The underground economy of fake antivirus software". In: Economics of Information Security and Privacy III (2011), pp. 55--78.
[27]
B. Stone-Gross et al. Understanding fraudulent activities in online ad exchanges". In: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM. 2011, pp. 279--294.
[28]
W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications in third-party android marketplaces". In: Proceedings of the second ACM conference on Data and Application Security and Privacy. ACM. 2012, pp. 317--326.
[29]
Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution". In: Security and Privacy (SP), 2012 IEEE Symposium on. IEEE. 2012, pp. 95--109.

Cited By

View all
  • (2023)ANDetect: A Third-party Ad Network Libraries Detection Framework for Android ApplicationsProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627182(98-112)Online publication date: 4-Dec-2023
  • (2023)A Robustness-Assured White-Box Watermark in Neural NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.324273720:6(5214-5229)Online publication date: Nov-2023
  • (2023)Mobile and Web Applications Clones: A Comprehensive Study2023 International Wireless Communications and Mobile Computing (IWCMC)10.1109/IWCMC58020.2023.10182983(464-469)Online publication date: 19-Jun-2023
  • Show More Cited By

Index Terms

  1. AdRob: examining the landscape and impact of android application plagiarism

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiSys '13: Proceeding of the 11th annual international conference on Mobile systems, applications, and services
    June 2013
    568 pages
    ISBN:9781450316729
    DOI:10.1145/2462456
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 June 2013

    Check for updates

    Author Tags

    1. advertising
    2. android
    3. measurement
    4. mobile
    5. plagiarism
    6. underground economy

    Qualifiers

    • Research-article

    Conference

    MobiSys'13
    Sponsor:

    Acceptance Rates

    MobiSys '13 Paper Acceptance Rate 33 of 211 submissions, 16%;
    Overall Acceptance Rate 274 of 1,679 submissions, 16%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)12
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 07 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)ANDetect: A Third-party Ad Network Libraries Detection Framework for Android ApplicationsProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627182(98-112)Online publication date: 4-Dec-2023
    • (2023)A Robustness-Assured White-Box Watermark in Neural NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.324273720:6(5214-5229)Online publication date: Nov-2023
    • (2023)Mobile and Web Applications Clones: A Comprehensive Study2023 International Wireless Communications and Mobile Computing (IWCMC)10.1109/IWCMC58020.2023.10182983(464-469)Online publication date: 19-Jun-2023
    • (2022)AndroMalPack: enhancing the ML-based malware classification by detection and removal of repacked apps for Android systemsScientific Reports10.1038/s41598-022-23766-w12:1Online publication date: 14-Nov-2022
    • (2020)Mutation Testing to Evaluate Android ApplicationsInternational Journal of Open Source Software and Processes10.4018/IJOSSP.202001010211:1(23-40)Online publication date: 1-Jan-2020
    • (2020)A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play StoreIEEE Transactions on Mobile Computing10.1109/TMC.2020.3007260(1-1)Online publication date: 2020
    • (2020)LibRoad: Rapid, Online, and Accurate Detection of TPLs on AndroidIEEE Transactions on Mobile Computing10.1109/TMC.2020.3003336(1-1)Online publication date: 2020
    • (2020)WLTDroid: Repackaging Detection Approach for Android ApplicationsWeb Information Systems and Applications10.1007/978-3-030-60029-7_52(579-591)Online publication date: 22-Sep-2020
    • (2019)A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit AppsThe World Wide Web Conference10.1145/3308558.3313427(3165-3171)Online publication date: 13-May-2019
    • (2019)Analyses for specific defects in android applicationsFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-018-7008-113:6(1210-1227)Online publication date: 1-Dec-2019
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media