计算机科学 ›› 2016, Vol. 43 ›› Issue (3): 199-205.doi: 10.11896/j.issn.1002-137X.2016.03.037

• 软件与数据库技术 • 上一篇    下一篇

多维度的安卓应用相似度分析

张希远,张刚,沈立炜,彭鑫,赵文耘   

  1. 复旦大学软件学院 上海201203;上海市数据科学重点实验室复旦大学 上海201203,上海理工大学光电信息与计算机工程学院 上海200093,复旦大学软件学院 上海201203;上海市数据科学重点实验室复旦大学 上海201203,复旦大学软件学院 上海201203;上海市数据科学重点实验室复旦大学 上海201203,复旦大学软件学院 上海201203;上海市数据科学重点实验室复旦大学 上海201203
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家“863”高技术研究发展计划项目(2013AA01A605),国家自然科学基金:安卓应用开发中模式驱动的代码推荐与完成技术研究(61402113)资助

Similarity Analysis of Multi-dimension Features of Android Applications

ZHANG Xi-yuan, ZHANG Gang, SHEN Li-wei, PENG Xin and ZHAO Wen-yun   

  • Online:2018-12-01 Published:2018-12-01

摘要: 基于安卓的智能设备的普及和移动互联网的发展带来了安卓应用的繁荣,但同时也带来了移动应用的开发、维护、安全等方面的问题。采取了多种技术,提取了安卓应用的功能描述、权限声明及源代码,并基于这些信息对1173个安卓应用进行了统计分析、相似度计算、聚类以及交叉对比;利用多个维度的安卓应用特征相似度分析,初步得到了安卓应用多个维度的相关规律,其可辅助不同的安卓应用的开发和管理任务,如权限过度声明检测、重打包检测、应用描述完善、领域内的公共类库的发现和提取等,从而帮助改善安卓市场的生态并提高安卓应用的开发效率。

关键词: 安卓应用,功能描述,权限,源代码,相似度

Abstract: The popularity of Android smart device and the development of mobile Internet bring prosperity to the Android application.But it also brings problem of development,maintenance and security about mobile application.This paper adopted a variety of techniques and extracted the features of Android applications including functional description,permission and source code,and performed statistical analysis,similarity calculation,clustering and cross-comparison on the information of 1173 Android applications.Through similarity analysis on three dimensions of features,we obtained some related regular pattern,which can assist kinds of development and management tasks on Android application such as excessive permission detection,re-packed detection,application description improvement,class library discovery and extraction of certain domain.Thereby it can help improve the ecology of Android market and improve the development efficiency of Android application.

Key words: Android applications,Functional description,Permission,Source code,Similarity

[1] Smartphone OS market share,Q3 2014.[2014-12-14].http://www.idc.com/prodserv/smartphone-os-market-share.jsp
[2] Zhou W,Zhou Y,Jiang X,et al.Detecting repackaged smartphone applications in third-party android marketplaces[C]∥Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy,2012.ACM,2012:317-326
[3] Zhou Y,Jiang X.Dissecting android malware:Characterization and evolution[C]∥IEEE Symposium on Security and Privacy,2012.IEEE,2012:95-109
[4] Zhu Jiao,Li Hong-wei,Peng Xin,et al.On Relationship of Functions and Permissions in Android Applications[J].Computer Applications and Software,2014,1(10):27-33
[5] F-Droid | Free and Open Source Android App Repository.[2014-12-14] .https://f-droid.org/
[6] Manifest.permission.[2014-12-14].http://developer.an-droid.com/reference/android/Manifest.permission.html
[7] Miller G A,Beckwith R,Fellbaum C,et al.Introduction to word-net:An on-line lexical database[J].International Journal of Lexicography,1990,3(4):235-244
[8] Wu Z,Palmer M.Verbs semantics and lexical selection[C]∥Proceedings of the 32nd Annual Meeting on Association for Computational Linguistics,1994.1994:133-138
[9] Jaccard_index.[2014-12-14].http://en.wikipedia.org/wiki/Jaccard_index
[10] Kamiya T,Kusumoto S,Inoue K.CCFinder:a multilinguistic token-based code clone detection system for large scale source code[J].IEEE Transactions on Software Engineering,2002,28(7):654-670
[11] Google Play.[2014-12-14].https://play.google.com/store
[12] Spectral Clusterer for WEKA.[2014-12-14].http://www.luigidragone.com/software/spectral-clusterer-for-weka/
[13] Spectral Clustering.[2014-12-14].http://en.wikipedia.org/wiki/Spectral_clustering
[14] ActionBarSherlock.[2014-12-14].http://actionbarsher-lock.com
[15] Jiang H,Ma H,Ren Z,et al.What makes a good app description?[C]∥Proceedings of the 6th Asia-Pacific Symposium on Internetware,2014.ACM,2014:45-53
[16] Pandita R,Xiao X,Yang W,et al.WHYPER:Towards Automating Risk Assessment of Mobile Applications[C]∥Proceedings of the 22nd Conference on USENIX Security Symposium,2013.2013:527-542
[17] Gorla A,Tavecchia I,Gross F,et al.Checking app behavioragainst app descriptions[C]∥ Proceedings of the 36th International Conference on Software Engineering,2014.ACM,2014:1025-1035
[18] Hanna S,Huang L,Wu E,et al.Juxtapp:A scalable system for detecting code reuse among android applications[M]∥Detection of Intrusions and Malware,and Vulnerability Assessment.Springer Berlin Heidelberg,2013:62-81
[19] Sun X,Zhongyang Y,Xin Z,et al.Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph[M]∥ICT Systems Security and Privacy Protection.Springer Berlin Heidelberg,2014:142-155

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!