Abstract
Software piracy is an act of illegal stealing and distributing commercial software either for revenue or identify theft. Pirated applications on Android app stores are harming developers and their users by clone scammers. The scammers usually generate pirated versions of the same applications and publish them in different open-source app stores. There is no centralized system between these app stores to prevent scammers from publishing pirated applications. As most of the app stores are hosted on cloud storage, therefore a cloud-based interaction system can prevent scammers from publishing pirated applications. In this paper, we proposed IoT-based cloud architecture for clone detection using program dependency analysis. First, the newly submitted APK and possible original files are selected from app stores. The APK Extractor and JDEX decompiler extract APK and DEX files for Java source code analysis. The dependency graphs of Java files are generated to extract a set of weighted features. The Stacked-Long Short-Term Memory (S-LSTM) deep learning model is designed to predict possible clones.
Experimental results have shown that the proposed approach can achieve an average accuracy of 95.48% among clones from different application stores.
- [1] . 2008. Cloud Computing. ACM, New York City, USA. Google Scholar
Digital Library
- [2] . 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems 29, 7 (2013), 1645–1660. Google Scholar
Digital Library
- [3] . 2018. Internet of Things for sensing: A case study in the healthcare system. Applied Sciences 8, 4 (2018), 508.Google Scholar
Cross Ref
- [4] . 2017. A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications 84 (2017), 25–37. Google Scholar
Digital Library
- [5] . 2017. Internet of Things Security. IEEE, Hefei, P. R. China.Google Scholar
- [6] . 2012. Detecting Repackaged Smartphone Applications in Third-party Android Marketplaces. ACM, San Antonio Texas USA. Google Scholar
Digital Library
- [7] . 2012. Smartphone Dual Defense Protection Framework: Detecting Malicious Applications in Android Markets. IEEE, Chengdu, Sichuan, China. Google Scholar
Digital Library
- [8] . 2012. Hey, You, Get Off of my Market: Detecting Malicious Apps in Official and Alternative Android Markets. Chengdu, Sichuan, China.Google Scholar
- [9] . 2020. A novel secure occupancy monitoring scheme based on the multi-chaos mapping. Symmetry 12, 3 (2020), 350.Google Scholar
Cross Ref
- [10] . 2019. Kerberoid: A Practical Android App Decompilation System with Multiple Decompilers. London United Kingdom. Google Scholar
Digital Library
- [11] . 2003. Winnowing: Local Algorithms for Document Fingerprinting. ACM, San Diego California. Google Scholar
Digital Library
- [12] . 2020. Source code comments: Overlooked in the realm of code clone detection. arXiv preprint arXiv:2006.14505 (2020).Google Scholar
- [13] . 2020. Clone Detection in Test Code: An Empirical Evaluation. IEEE, ON, Canada.Google Scholar
- [14] . 2013. Androguard-reverse engineering, malware and goodware analysis of Android applications. URL code. Google. com/p/androguard 153 (2013).Google Scholar
- [15] . 2006. GPLAG: Detection of Software Plagiarism by Program Dependence Graph Analysis. ACM, Philadelphia PA USA. Google Scholar
Digital Library
- [16] . 2011. Analyzing Inter-application Communication in Android. ACM, Bethesda Maryland USA. Google Scholar
Digital Library
- [17] . 2011. PiOS: Detecting Privacy Leaks in iOS Applications. San Diego, California.Google Scholar
- [18] . 2014. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS) 32, 2 (2014), 5. Google Scholar
Digital Library
- [19] . 2018. X9: An Obfuscation Resilient Approach for Source Code Plagiarism Detection in Virtual Learning Environments. Gaula, Portugal.Google Scholar
- [20] . 2015. Wukong: A Scalable and Accurate Two-phase Approach to Android App Clone Detection. ACM, Baltimore MD USA. Google Scholar
Digital Library
- [21] . 2013. Scalable Semantics-based Detection of Similar Android Applications. Citeseer, Egham, UK.Google Scholar
- [22] . 2017. LibD: Scalable and Precise Third-Party Library Detection in Android Markets. IEEE, Buenos Aires, Argentina. Google Scholar
Digital Library
- [23] . 2015. Detecting Clones in Android Applications Through Analyzing User Interfaces. IEEE Press, Florence, Italy. Google Scholar
Digital Library
- [24] . 2013. Plagiarism detection over the web. International Journal of Computer Applications 68, 15 (2013), 17–20.Google Scholar
Cross Ref
- [25] . 2018. Security threats to critical infrastructure: The human factor. The Journal of Supercomputing (2018), 1–17. Google Scholar
Digital Library
- [26] . 2014. Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets. ACM, Hyderabad India. Google Scholar
Digital Library
- [27] . 2019. Detection of clone scammers in Android markets using IoT-based edge computing. Transactions on Emerging Telecommunications Technologies (2019), e3791.Google Scholar
- [28] . 1989. The Semantics of Program Dependence. ACM, Texas, USA. Google Scholar
Digital Library
- [29] . 1987. The program dependence graph and its use in optimization. ACM Transactions on Programming Languages and Systems (TOPLAS) 9, 3 (1987), 319–349. Google Scholar
Digital Library
- [30] . 2004. What's ANTLR (2004).Google Scholar
- [31] . 2011. A comparative study of TF* IDF, LSI and multi-words for text classification. Expert Systems with Applications 38, 3 (2011), 2758–2765. Google Scholar
Digital Library
- [32] . 2013. A Novel TF-IDF Weighting Scheme for Effective Ranking. ACM, Dublin Ireland. Google Scholar
Digital Library
- [33] . 2013. Evaluating Source Code Summarization Techniques: Replication and Expansion. IEEE San Francisco, CA, USA.Google Scholar
- [34] . 2017. Supervised Deep Features for Software Functional Clone Detection by Exploiting Lexical and Syntactical Information in Source Code. Melbourne, Australia. Google Scholar
Digital Library
- [35] . 2019. Learning-based Recursive Aggregation of Abstract Syntax Trees for Code Clone Detection. IEEE, Hangzhou, China.Google Scholar
Cross Ref
- [36] . 2014. Learning activation functions to improve deep neural networks. arXiv preprint arXiv:1412.6830 (2014).Google Scholar
- [37] . 2020. Privacy-preserving non-wearable occupancy monitoring system exploiting Wi-Fi imaging for next-generation body-centric communication. Micromachines 11, 4 (2020), 379.Google Scholar
Cross Ref
- [38] . 2011. A Metrics-based data Mining Approach for Software Clone Detection. IEEE. Google Scholar
Digital Library
- [39] . 2011. Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation (2011).Google Scholar
Index Terms
IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification
Recommendations
Migrating Android Applications to the Cloud
Recently, smartphone technologies have evolved quickly and offered end users the computing power and networking capabilities required to perform useful network and multimedia applications. However, due to limited physical sizes and battery capacities, ...
Android: Changing the Mobile Landscape
The mobile phone landscape changed last year with the introduction of smart phones running Android, a platform marketed by Google. Android phones are the first credible threat to the iPhone market. Not only did Google target the same consumers as iPhone,...






Comments