Computer Science ›› 2016, Vol. 43 ›› Issue (3): 199-205, 219.doi: 10.11896/j.issn.1002-137X.2016.03.037

Previous Articles     Next Articles

Similarity Analysis of Multi-dimension Features of Android Applications

ZHANG Xi-yuan, ZHANG Gang, SHEN Li-wei, PENG Xin and ZHAO Wen-yun   

  • Online:2018-12-01 Published:2018-12-01

Abstract: The popularity of Android smart device and the development of mobile Internet bring prosperity to the Android application.But it also brings problem of development,maintenance and security about mobile application.This paper adopted a variety of techniques and extracted the features of Android applications including functional description,permission and source code,and performed statistical analysis,similarity calculation,clustering and cross-comparison on the information of 1173 Android applications.Through similarity analysis on three dimensions of features,we obtained some related regular pattern,which can assist kinds of development and management tasks on Android application such as excessive permission detection,re-packed detection,application description improvement,class library discovery and extraction of certain domain.Thereby it can help improve the ecology of Android market and improve the development efficiency of Android application.

Key words: Android applications,Functional description,Permission,Source code,Similarity

[1] Smartphone OS market share,Q3 2014.[2014-12-14].
[2] Zhou W,Zhou Y,Jiang X,et al.Detecting repackaged smartphone applications in third-party android marketplaces[C]∥Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy,2012.ACM,2012:317-326
[3] Zhou Y,Jiang X.Dissecting android malware:Characterization and evolution[C]∥IEEE Symposium on Security and Privacy,2012.IEEE,2012:95-109
[4] Zhu Jiao,Li Hong-wei,Peng Xin,et al.On Relationship of Functions and Permissions in Android Applications[J].Computer Applications and Software,2014,1(10):27-33
[5] F-Droid | Free and Open Source Android App Repository.[2014-12-14] .
[6] Manifest.permission.[2014-12-14].
[7] Miller G A,Beckwith R,Fellbaum C,et al.Introduction to word-net:An on-line lexical database[J].International Journal of Lexicography,1990,3(4):235-244
[8] Wu Z,Palmer M.Verbs semantics and lexical selection[C]∥Proceedings of the 32nd Annual Meeting on Association for Computational Linguistics,1994.1994:133-138
[9] Jaccard_index.[2014-12-14].
[10] Kamiya T,Kusumoto S,Inoue K.CCFinder:a multilinguistic token-based code clone detection system for large scale source code[J].IEEE Transactions on Software Engineering,2002,28(7):654-670
[11] Google Play.[2014-12-14].
[12] Spectral Clusterer for WEKA.[2014-12-14].
[13] Spectral Clustering.[2014-12-14].
[14] ActionBarSherlock.[2014-12-14].
[15] Jiang H,Ma H,Ren Z,et al.What makes a good app description?[C]∥Proceedings of the 6th Asia-Pacific Symposium on Internetware,2014.ACM,2014:45-53
[16] Pandita R,Xiao X,Yang W,et al.WHYPER:Towards Automating Risk Assessment of Mobile Applications[C]∥Proceedings of the 22nd Conference on USENIX Security Symposium,2013.2013:527-542
[17] Gorla A,Tavecchia I,Gross F,et al.Checking app behavioragainst app descriptions[C]∥ Proceedings of the 36th International Conference on Software Engineering,2014.ACM,2014:1025-1035
[18] Hanna S,Huang L,Wu E,et al.Juxtapp:A scalable system for detecting code reuse among android applications[M]∥Detection of Intrusions and Malware,and Vulnerability Assessment.Springer Berlin Heidelberg,2013:62-81
[19] Sun X,Zhongyang Y,Xin Z,et al.Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph[M]∥ICT Systems Security and Privacy Protection.Springer Berlin Heidelberg,2014:142-155

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .