DSpace Repository

DroidClone: Attack of the Android Malware Clones - A Step Towards Stopping Them

Show simple item record

dc.contributor.author Alam, Shahid
dc.contributor.author Sogukpinar, Ibrahim
dc.date.accessioned 2023-01-09T07:16:52Z
dc.date.available 2023-01-09T07:16:52Z
dc.date.issued 2021-01
dc.identifier.citation Alam, S., & Sogukpinar, I. (2021). DroidClone: Attack of the android malware clones - a step towards stopping them. Computer Science and Information Systems, 18(1), 67-91. https://doi.org/10.2298/CSIS200330035A tr_TR
dc.identifier.issn 1820-0214
dc.identifier.uri http://openacccess.atu.edu.tr:8080/xmlui/handle/123456789/4108
dc.identifier.uri http://dx.doi.org/10.2298/CSIS200330035A
dc.description WOS indeksli yayınlar koleksiyonu. / WOS indexed publications collection. tr_TR
dc.description.abstract Code clones are frequent in use because they can be created fast with little effort and expense. Especially for malware writers, it is easier to create a clone of the original than writing a new malware. According to the recent Symantec threat reports, Android continues to be the most targeted mobile platform, and the number of new mobile malware clones grew by 54%. There is a need to develop techniques and tools to stop this attack of Android malware clones. To stop this attack, we propose DroidClone that exposes code clones (segments of code that are similar) in Android applications to help detect malware. DroidClone is the first such effort uses specific control flow patterns for reducing the effect of obfuscations and detect clones that are syntactically different but semantically similar up to a threshold. DroidClone is independent of the programming language of the code clones. When evaluated with real malware and benign Android applications, DroidClone obtained a detection rate of 94.2% and false positive rate of 5.6%. DroidClone, when tested against various obfuscations, was able to successfully provide resistance against all the trivial (Renaming methods, parameters, and nop insertion, etc) and some non-trivial (Call graph manipulation and function indirection, etc.) obfuscations. tr_TR
dc.language.iso en tr_TR
dc.publisher COMPUTER SCIENCE AND INFORMATION SYSTEMS / COMSIS CONSORTIUM tr_TR
dc.relation.ispartofseries 2021;Volume: 18 Issue: 1
dc.subject Android tr_TR
dc.subject Code Clones tr_TR
dc.subject MAIL tr_TR
dc.subject Malware Analysis and Detection tr_TR
dc.subject TF-IDF tr_TR
dc.subject Machine Learning tr_TR
dc.title DroidClone: Attack of the Android Malware Clones - A Step Towards Stopping Them tr_TR
dc.type Article tr_TR


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account