Skip to content
2000
Volume 5, Issue 1
  • ISSN: 2210-3279
  • E-ISSN: 2210-3287

Abstract

Android is one of the most successful OS for smart devices and its large user base has inevitably made it the most targeted mobile OS by malwares. Android malwares have been found to have a host of different motives but most use repackaged apps as the preferred means of propagation into users' devices. This is done to exploit the popularity and trustworthiness of a legitimate app. The repackaged versions of the apps ask for more privileges at the time of installation and innocent or ignorant users install the app anyway. In this paper we propose a framework for automatic detection of repackaged apps. Our framework determines whether an app is asking for unnecessary privileges by leveraging the original manifest information of the app. The developer needs to provide the manifest information at the time of releasing the app. When a new app is installed the user is simply informed whether the app is safe or not. Our solution incurs an ignorable overhead on the Smartphone devices. It can provide highly accurate detection of repackaged version of any known app.

Loading

Article metrics loading...

/content/journals/swcc/10.2174/2210327905999150521110048
2015-04-01
2025-09-23
Loading full text...

Full text loading...

/content/journals/swcc/10.2174/2210327905999150521110048
Loading

  • Article Type:
    Research Article
Keyword(s): Android; Broadcast actions; Package name; Permissions; Repackaging
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test