Repacked android application detection using image similarity

Authors

  • M.A. Rahim Khan Lingaya’s Vidyapeeth, Faridabad, Haryana 121002. India
  • R.C. Tripathi Lingaya’s Vidyapeeth, Faridabad, Haryana 121002. India
  • Ajit Kumar Lingaya’s Vidyapeeth, Faridabad, Haryana 121002. India

DOI:

https://doi.org/10.5377/nexo.v33i01.10058

Keywords:

Repacked Android application, Image Representation, Perceptual Hashing String Distance

Abstract

The popularity of Android brings many functionalities to its users but it also brings many threats. Repacked Android application is one such threat which is the root of many other threats such as malware, phishing, adware, and economical loss. Earlier many techniques have been proposed for the detection of repacked application but they have their limitations and bottlenecks. In this work, we proposed an image similarity based repacked application detection technique. The proposed work utilized the main idea behind the repacking of application that is “the attacker wants to create fake application looking visually similar to the original". We convert each APK file into a grayscale image and then use perceptual hashing for creating a hash of each image. The string distance algorithms like Hamming distance was used to calculate the distance and searching for the repacked application. The proposed work also used distance calculation on binary features extracted from the app. The proposed work is very powerful in terms of detection accuracy and scanning speed and we achieved 96% accuracy.

Downloads

Download data is not yet available.
Abstract
640
PDF 638

Downloads

Published

2020-07-20

How to Cite

Rahim Khan, M., Tripathi, R., & Kumar, A. (2020). Repacked android application detection using image similarity. Nexo Scientific Journal, 33(01), 190–199. https://doi.org/10.5377/nexo.v33i01.10058

Issue

Section

Articles

Similar Articles

<< < 12 13 14 15 16 17 18 19 20 21 > >> 

You may also start an advanced similarity search for this article.