Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3366423.3380243acmconferencesArticle/Chapter ViewAbstractPublication PageswebconfConference Proceedingsconference-collections
research-article

Mobile App Squatting

Published: 20 April 2020 Publication History
  • Get Citation Alerts
  • Abstract

    Domain squatting, the adversarial tactic where attackers register domain names that mimic popular ones, has been observed for decades. However, there has been growing anecdotal evidence that this style of attack has spread to other domains. In this paper, we explore the presence of squatting attacks in the mobile app ecosystem. In “App Squatting”, attackers release apps with identifiers (e.g., app name or package name) that are confusingly similar to those of popular apps or well-known Internet brands. This paper presents the first in-depth measurement study of app squatting showing its prevalence and implications. We first identify 11 common deformation approaches of app squatters and propose “AppCrazy”, a tool for automatically generating variations of app identifiers. We have applied AppCrazy to the top-500 most popular apps in Google Play, generating 224,322 deformation keywords which we then use to test for app squatters on popular markets. Through this, we confirm the scale of the problem, identifying 10,553 squatting apps (an average of over 20 squatting apps for each legitimate one). Our investigation reveals that more than 51% of the squatting apps are malicious, with some being extremely popular (up to 10 million downloads). Meanwhile, we also find that mobile app markets have not been successful in identifying and eliminating squatting apps. Our findings demonstrate the urgency to identify and prevent app squatting abuses. To this end, we have publicly released all the identified squatting apps, as well as our tool AppCrazy.

    References

    [1]
    2017. Attackers Use Typo-Squatting To Steal npm Credentials. https://threatpost.com/attackers-use-typo-squatting-to-steal-npm-credentials/127235/.
    [2]
    2017. PyPI Python repository hit by typosquatting sneak attack. https://nakedsecurity.sophos.com/2017/09/19/pypi-python-repository-hit-by-typosquatting-sneak-attack/.
    [3]
    2017. Ten Malicious Libraries Found on PyPI - Python Package Index. https://www.bleepingcomputer.com/news/security/ten-malicious-libraries-found-on-pypi-python-package-index/.
    [4]
    2017. This typosquatting attack on npm went undetected for 2 weeks. https://www.theregister.co.uk/2017/08/02/typosquatting_npm/.
    [5]
    2018. Adobe Scan. ttps://play.google.com/store/apps/details?id=com.adobe.scan.android.
    [6]
    2018. Android/Adware.MobiDash. https://blog.malwarebytes.com/detections/android-adware-mobidash.
    [7]
    2018. Androzoo. https://androzoo.uni.lu/.
    [8]
    2018. Common English Words. https://github.com/first20hours/google-10000-english.
    [9]
    2018. Cybersquatting - Wikipedia. https://en.wikipedia.org/wiki/Cybersquatting.
    [10]
    2018. DNSTwist: domain name permutation engine. https://github.com/elceef/dnstwist/.
    [11]
    2018. Dot-cm Typosquatting. ttps://krebsonsecurity.com/2018/04/dot-cm-typosquatting-sites-visited-12m-times-so-far-in-2018.
    [12]
    2018. Facebook. https://play.google.com/store/apps/details?id=com.facebook.katana.
    [13]
    2018. Fake mobile apps, a growing threat. https://www.guardsquare.com/en/blog/fake-mobile-apps-growing-threat.
    [14]
    2018. Fake Teleg’e’ram on Google Play. https://www.zscaler.com/blogs/research/fake-telegeram-google-play.
    [15]
    2018. Fake WhatsApp app fooled million Android users on Google Play: Did you fall for it?https://www.zdnet.com/article/fake-whatsapp-app-fooled-million-android-users-on-google-play-did-you-fall-for-it/.
    [16]
    2018. Flashlight. https://play.google.com/store/apps/details?id=app.real.flashlight.
    [17]
    2018. GooglePlay. https://play.google.com.
    [18]
    2018. Instagram. https://play.google.com/store/apps/details?id=com.instagram.android.
    [19]
    2018. Janus. https://www.appscan.io.
    [20]
    2018. Koodous. https://koodous.com.
    [21]
    2018. Pinterest. https://play.google.com/store/apps/details?id=com.pinterest.
    [22]
    2018. PyPI Python repository hit by typosquatting sneak attack. https://nakedsecurity.sophos.com/2017/09/19/pypi-python-repository-hit-by-typosquatting-sneak-attack.
    [23]
    2018. Snapchat. https://play.google.com/store/apps/details?id=com.snapchat.android.
    [24]
    2018. Telegram. https://play.google.com/store/apps/details?id=org.telegram.messenger.
    [25]
    2018. Tinder. https://play.google.com/store/apps/details?id=com.tinder.
    [26]
    2018. Trojan:Android/Fakeinst. https://www.f-secure.com/v-descs/trojan_android_fakeinst.shtml.
    [27]
    2018. Tumblr. https://play.google.com/store/apps/details?id=com.tumblr.
    [28]
    2018. Twelve malicious Python libraries found and removed from PyPI. https://www.zdnet.com/article/twelve-malicious-python-libraries-found-and-removed-from-pypi/.
    [29]
    2018. twitter. https://play.google.com/store/apps/details?id=com.twitter.android.
    [30]
    2018. Typosquatting - Wikipedia. https://en.wikipedia.org/wiki/Typosquatting.
    [31]
    2018. URLCrazy. https://www.morningstarsecurity.com/research/urlcrazy.
    [32]
    2018. Video Player. https://play.google.com/store/apps/details?id=com.enhance.videoplayer.free.
    [33]
    2018. VirusTotal. https://www.virustotal.com.
    [34]
    2018. WeChat. https://play.google.com/store/apps/details?id=com.tencent.mm.
    [35]
    2018. What is Teligram? Fake Telegram app found serving up malware and ads on Google Play Store. https://www.ibtimes.co.uk/what-teligram-fake-telegram-app-found-serving-malware-ads-google-play-store-1655019.
    [36]
    2018. Whatsapp. https://play.google.com/store/apps/details?id=com.whatsapp.
    [37]
    2018. Wochat. https://play.google.com/store/apps/details?id=io.wochat.app.
    [38]
    2018. YouTube Music. https://play.google.com/store/apps/details?id=com.google.android.youtube.
    [39]
    2019. 1Mobile. http://www.1mobile.com.
    [40]
    2019. 25PP Market. https://www.25pp.com/android.
    [41]
    2019. 360 Market. http://zhushou.360.cn/?_gtype=guagua.
    [42]
    2019. 91 Assistant. http://zs.91.com/resourcea-app.html?page=1&type=android&restype=soft.
    [43]
    2019. Angeeks. http://apk.angeeks.com.
    [44]
    2019. Anzhi Market. http://www.anzhi.com.
    [45]
    2019. AnzhuoApk. http://www.anzhuoapk.com.
    [46]
    2019. Apkpure. https://apkpure.com/cn.
    [47]
    2019. AppChina. http://www.appchina.com.
    [48]
    2019. Baidu Market. https://shouji.baidu.com.
    [49]
    2019. CNMO. http://app.cnmo.com/android.
    [50]
    2019. Coolpad Market. https://www.coolmart.net.cn.
    [51]
    2019. Dangle Market. https://app.d.cn.
    [52]
    2019. EOE Market. http://www.eoemarket.com.
    [53]
    2019. Freeware Lovers. http://www.freewarelovers.com/apps.
    [54]
    2019. GFan. http://apk.gfan.com/gamess_8_1_1.html.
    [55]
    2019. Huawei Market. http://app.hicloud.com.
    [56]
    2019. Lenovo Market. https://www.lenovomm.com.
    [57]
    2019. Liqu Market. https://www.liqucn.com.
    [58]
    2019. Meizu Market. http://app.flyme.cn/apps/public/index.
    [59]
    2019. MGYApp. http://www.mgyapp.com.
    [60]
    2019. Mobiseclab. http://akana.mobiseclab.org.
    [61]
    2019. Mumayi. http://www.mumayi.com.
    [62]
    2019. MyApp Market. https://sj.qq.com/myapp.
    [63]
    2019. NDuo. http://www.nduo.cn/Home/Index/0/?webType=web.
    [64]
    2019. OPPO Market. https://store.oppomobile.com.
    [65]
    2019. PCOnline. https://dl.pconline.com.cn/android.
    [66]
    2019. SouGou Market. http://zhushou.sogou.com/apps.
    [67]
    2019. Uptodown. https://www.uptodown.cc.
    [68]
    2019. Wandoujia. https://www.wandoujia.com.
    [69]
    2019. Xiaomi Market. http://app.mi.com.
    [70]
    2019. ZOL Market. http://sj.zol.com.cn.
    [71]
    Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, and CERT Siemens. 2014. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In Ndss, Vol. 14. 23–26.
    [72]
    Juan Caballero, Chris Grier, Christian Kreibich, and Vern Paxson. 2011. Measuring pay-per-install: the commoditization of malware distribution. In Usenix Security Symposium. 13–13.
    [73]
    Fabio CHAKRABORTY, Tanmoy; PIERAZZI. 2017. Ensemble clustering and classification for predicting android malware families. In IEEE Transactions on Dependable and Secure Computing. IEEE, 1–1.
    [74]
    Peng Liu Chen, Kai and Yingjun Zhang. 2014. Achieving accuracy and scalability simultaneously in detecting application clones on android markets. In The 36th International Conference on Software Engineering. ACM, 175–186.
    [75]
    Jonathan Crussell, Clint Gibler, and Hao Chen. 2012. Attack of the clones: Detecting cloned applications on android markets. In European Symposium on Research in Computer Security. Springer, 37–54.
    [76]
    Jonathan Crussell, Clint Gibler, and Hao Chen. 2013. Scalable semantics-based detection of similar android applications. In Proc. of ESORICS, Vol. 13. Citeseer.
    [77]
    Feng Dong, Haoyu Wang, Li Li, Yao Guo, Tegawendé F Bissyandé, Tianming Liu, Guoai Xu, and Jacques Klein. 2018. Frauddroid: Automated ad fraud detection for android apps. In Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE ’18). 257–268.
    [78]
    Yahia Elsayed and Ahmed Shosha. 2018. Large scale detection of IDN domain name masquerading. In 2018 APWG Symposium on Electronic Crime Research (eCrime). IEEE, 1–11.
    [79]
    Evgeniy Gabrilovich and Alex Gontmakher. 2002. The homograph attack. Commun. ACM 45, 2 (2002), 128.
    [80]
    Olga Gadyatskaya, Andra-Lidia Lezza, and Yury Zhauniarovich. 2016. Evaluation of Resource-Based App Repackaging Detection in Android. In Nordic Conference on Secure IT Systems. Springer, 135–151.
    [81]
    Ali GHARIB, Amirhossein; GHORBANI. 2017. DNA-Droid: a real-time android ransomware detection framework. In International Conference on Network and System Security. Springer, 184–198.
    [82]
    Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, and Dawn Song. 2012. Juxtapp: A scalable system for detecting code reuse among android applications. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 62–81.
    [83]
    Tobias Holgers, David E Watson, and Steven D Gribble. 2006. Cutting through the Confusion: A Measurement Study of Homograph Attacks. In USENIX Annual Technical Conference. 261–266.
    [84]
    Yangyu Hu, Haoyu Wang, Li Li, Yao Guo, Guoai Xu, and Ren He. 2019. Want to earn a few extra bucks? a first look at money-making apps. In 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 332–343.
    [85]
    Yangyu Hu, Haoyu Wang, Yajin Zhou, Yao Guo, Li Li, Bingxuan Luo, and Fangren Xu. 2019. Dating with scambots: Understanding the ecosystem of fraudulent dating applications. IEEE Transactions on Dependable and Secure Computing (2019).
    [86]
    Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, and Roya Ensafi. 2019. The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading. Web Conference (2019).
    [87]
    Xuxian Jiang and Yajin Zhou. 2012. Dissecting android malware: Characterization and evolution. In 2012 IEEE Symposium on Security and Privacy. IEEE, 95–109.
    [88]
    Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero-Gomez, Nikolaos Pitropakis, Nick Nikiforakis, and Manos Antonakakis. 2017. Hiding in plain sight: a longitudinal study of combosquatting abuse. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 569–586.
    [89]
    Su Mon Kywe, Yingjiu Li, Robert H Deng, and Jason Hong. 2014. Detecting camouflaged applications on mobile application markets. In International Conference on Information Security and Cryptology. Springer, 241–254.
    [90]
    Li Li, Tegawendé F Bissyandé, Haoyu Wang, and Jacques Klein. 2019. On identifying and explaining similarities in android apps. Journal of Computer Science and Technology 34, 2 (2019), 437–455.
    [91]
    Jialiu Lin, Shahriyar Amini, Jason I Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM conference on ubiquitous computing. 501–510.
    [92]
    Tianming Liu, Haoyu Wang, Li Li, Guangdong Bai, Yao Guo, and Guoai Xu. 2019. DaPanda: Detecting Aggressive Push Notifications in Android Apps. In 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 66–78.
    [93]
    Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F Bissyandé, and Jacques Klein. 2020. MadDroid: Characterising and Detecting Devious Ad Content for Android Apps. In The World Wide Web Conference. 1988–1999.
    [94]
    Ziang Ma, Haoyu Wang, Yao Guo, and Xiangqun Chen. 2016. LibRadar: fast and accurate detection of third-party libraries in Android apps. In Proceedings of the 38th International Conference on Software Engineering Companion (ICSE-C ’16). 653–656.
    [95]
    Nick Nikiforakis, Marco Balduzzi, Lieven Desmet, Frank Piessens, and Wouter Joosen. 2014. Soundsquatting: Uncovering the use of homophones in domain squatting. In International Conference on Information Security. Springer, 291–308.
    [96]
    Nick Nikiforakis, Steven Van Acker, Wannes Meert, Lieven Desmet, Frank Piessens, and Wouter Joosen. 2013. Bitsquatting: Exploiting bit-flips for fun, or profit?. In Proceedings of the 22nd international conference on World Wide Web. ACM, 989–998.
    [97]
    Yuta Sawabe, Daiki Daiki, Mitsuaki Akiyama, and Shigeki Goto. 2018. Detecting Homograph IDNs Using OCR. Proceedings of the Asia-Pacific Advanced Network 46 (2018), 56–64.
    [98]
    et al Sebastián, Marcos. 2016. Avclass: A tool for massive malware labeling. In International Symposium on Research in Attacks, Intrusions, and Defenses. Springer.
    [99]
    Yuru Shao, Xiapu Luo, Chenxiong Qian, Pengfei Zhu, and Lei Zhang. 2014. Towards a scalable resource-driven approach for detecting repackaged android applications. In Proceedings of the 30th Annual Computer Security Applications Conference. ACM, 56–65.
    [100]
    Charlie Soh, Hee Beng Kuan Tan, Yauhen Leanidavich Arnatovich, and Lipo Wang. 2015. Detecting clones in android applications through analyzing user interfaces. In Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension. IEEE Press, 163–173.
    [101]
    Jeffrey Spaulding, Shambhu Upadhyaya, and Aziz Mohaisen. 2016. The landscape of domain name typosquatting: Techniques and countermeasures. In 2016 11th International Conference on Availability, Reliability and Security (ARES). IEEE, 284–289.
    [102]
    Janos Szurdi, Kocso Balazs, Cseh Gabor, Spring Jonathan, Felegyhazi Mark, and Kanich Chris. 2014. The long ”taile” of typosquatting domain names. In Usenix Security Symposium. 191–206.
    [103]
    Janos Szurdi and Nicolas Christin. 2017. Email Typosquatting. In Proceedings of the 2017 Internet Measurement Conference (IMC ’17). 419–431.
    [104]
    Bohm T. 2014. Letter and symbol misrecognition in highly legible typefaces for general, children, dyslexic, visually impaired and ageing readers. In Information Design Journal. 34–50.
    [105]
    Chongbin Tang, Sen Chen, Lingling Fan, Lihua Xu, Yang Liu, Zhushou Tang, and Liang Dou. 2019. A large-scale empirical study on industrial fake apps. In 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, 183–192.
    [106]
    Kurt Thomas, Juan A Elices Crespo, Ryan Rasti, Jean Michel Picod, Cait Phillips, Marc-André Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, 2016. Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. In USENIX Security Symposium. 721–739.
    [107]
    Ke Tian, Steve TK Jan, Hang Hu, Danfeng Yao, and Gang Wang. 2018. Needle in a haystack: tracking down elite phishing domains in the wild. In Proceedings of the Internet Measurement Conference (IMC ’18). ACM, 429–442.
    [108]
    Nikolai Philipp Tschacher. 2016. Typosquatting in programming language package managers. Ph.D. Dissertation. Universität Hamburg, Fachbereich Informatik.
    [109]
    Haoyu Wang, Yao Guo, Ziang Ma, and Xiangqun Chen. 2015. WuKong: a scalable and accurate two-phase approach to Android app clone detection. In Proceedings of the 2015 International Symposium on Software Testing and Analysis. ACM, 71–82.
    [110]
    Haoyu Wang, Jason Hong, and Yao Guo. 2015. Using text mining to infer the purpose of permission use in mobile apps. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. 1107–1118.
    [111]
    Haoyu Wang, Hao Li, and Yao Guo. 2019. Understanding the evolution of mobile app ecosystems: A longitudinal measurement study of google play. In The World Wide Web Conference. 1988–1999.
    [112]
    Haoyu Wang, Hao Li, Li Li, Yao Guo, and Guoai Xu. 2018. Why are Android apps removed from Google Play?: a large-scale empirical study. In Proceedings of the 15th International Conference on Mining Software Repositories. ACM, 231–242.
    [113]
    Haoyu Wang, Yuanchun Li, Yao Guo, Yuvraj Agarwal, and Jason I Hong. 2017. Understanding the purpose of permission use in mobile apps. ACM Transactions on Information Systems (TOIS) 35, 4 (2017), 1–40.
    [114]
    Haoyu Wang, Hongxuan Liu, Xusheng Xiao, Guozhu Meng, and Yao Guo. 2019. Characterizing Android App Signing Issues. In 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 280–292.
    [115]
    Haoyu Wang, Zhe Liu, Yao Guo, Xiangqun Chen, Miao Zhang, Guoai Xu, and Jason Hong. 2017. An explorative study of the mobile app ecosystem from app developers’ perspective. In Proceedings of the 26th International Conference on World Wide Web. 163–172.
    [116]
    Haoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, and Guoai Xu. 2018. Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. In 2018 Internet Measurement Conference (IMC ’18).
    [117]
    Yi-Min Wang, Doug Beck, Jeffrey Wang, Chad Verbowski, and Brad Daniels. 2006. Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting. SRUTI 6(2006), 31–36.
    [118]
    Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, and Wu Zhou. 2017. Deep ground truth analysis of current android malware. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 252–276.
    [119]
    Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, 2019. DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2421–2436.
    [120]
    Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu, and Peng Liu. 2014. ViewDroid: Towards obfuscation-resilient mobile application repackaging detection. In Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks. ACM, 25–36.
    [121]
    Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La Spina, and Ermanno Moser. 2014. FSquaDRA: fast detection of repackaged applications. In IFIP Annual Conference on Data and Applications Security and Privacy. 130–145.
    [122]
    Min Zheng, Patrick PC Lee, and John CS Lui. 2012. ADAM: an automatic and extensible platform to stress test android anti-virus systems. In International conference on detection of intrusions and malware, and vulnerability assessment. 82–101.
    [123]
    Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang, and Shihong Zou. 2013. Fast, scalable detection of piggybacked mobile applications. In Proceedings of the third ACM conference on Data and application security and privacy. ACM, 185–196.
    [124]
    Wu Zhou, Yajin Zhou, Xuxian Jiang, and Peng Ning. 2012. Detecting repackaged smartphone applications in third-party android marketplaces. In Proceedings of the second ACM conference on Data and Application Security and Privacy. ACM, 317–326.
    [125]
    Zakiah Zulkefli, Manmeet Mahinderjit Singh, Azizul Rahman Mohd Shariff, and Azman Samsudin. 2017. Typosquat Cyber Crime Attack Detection via Smartphone. Procedia Computer Science 124 (2017), 664–671.

    Cited By

    View all
    • (2024)Username Squatting on Online Social Networks: A Study on XProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637637(621-637)Online publication date: 1-Jul-2024
    • (2023)Beyond typosquattingProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620430(3439-3456)Online publication date: 9-Aug-2023
    • (2023)Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children’s AppsProceedings of the ACM Web Conference 202310.1145/3543507.3583327(2166-2177)Online publication date: 30-Apr-2023
    • Show More Cited By

    Index Terms

    1. Mobile App Squatting
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          WWW '20: Proceedings of The Web Conference 2020
          April 2020
          3143 pages
          ISBN:9781450370233
          DOI:10.1145/3366423
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 20 April 2020

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. Android
          2. app squatting
          3. fake app
          4. malware
          5. typosquatting

          Qualifiers

          • Research-article
          • Research
          • Refereed limited

          Conference

          WWW '20
          Sponsor:
          WWW '20: The Web Conference 2020
          April 20 - 24, 2020
          Taipei, Taiwan

          Acceptance Rates

          Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)84
          • Downloads (Last 6 weeks)10
          Reflects downloads up to

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Username Squatting on Online Social Networks: A Study on XProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637637(621-637)Online publication date: 1-Jul-2024
          • (2023)Beyond typosquattingProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620430(3439-3456)Online publication date: 9-Aug-2023
          • (2023)Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children’s AppsProceedings of the ACM Web Conference 202310.1145/3543507.3583327(2166-2177)Online publication date: 30-Apr-2023
          • (2023)Mixed Signals: Analyzing Software Attribution Challenges in the Android EcosystemIEEE Transactions on Software Engineering10.1109/TSE.2023.323658249:4(2964-2979)Online publication date: 1-Apr-2023
          • (2023)Mobile User Interface Element Detection Via Adaptively Prompt Tuning2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)10.1109/CVPR52729.2023.01073(11155-11164)Online publication date: Jun-2023
          • (2023)ReuNify: A Step Towards Whole Program Analysis for React Native Android Apps2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE)10.1109/ASE56229.2023.00113(1390-1402)Online publication date: 11-Sep-2023
          • (2023)Semantic similarity for mobile application recommendation under scarce user dataEngineering Applications of Artificial Intelligence10.1016/j.engappai.2023.105974121:COnline publication date: 1-May-2023
          • (2022)Analysis of Android Applications Shared on Twitter Focusing on Accessibility ServicesJournal of Information Processing10.2197/ipsjjip.30.60130(601-612)Online publication date: 2022
          • (2022)LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic WatermarksProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560678(2129-2143)Online publication date: 7-Nov-2022
          • (2022)Demystifying “removed reviews” in iOS app storeProceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3540250.3558966(1489-1499)Online publication date: 7-Nov-2022
          • Show More Cited By

          View Options

          Get Access

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format.

          HTML Format

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media