Computer Science ›› 2016, Vol. 43 ›› Issue (3): 199-205.doi: 10.11896/j.issn.1002-137X.2016.03.037

Previous Articles     Next Articles

Similarity Analysis of Multi-dimension Features of Android Applications

ZHANG Xi-yuan, ZHANG Gang, SHEN Li-wei, PENG Xin and ZHAO Wen-yun   

  • Online:2018-12-01 Published:2018-12-01

Abstract: The popularity of Android smart device and the development of mobile Internet bring prosperity to the Android application.But it also brings problem of development,maintenance and security about mobile application.This paper adopted a variety of techniques and extracted the features of Android applications including functional description,permission and source code,and performed statistical analysis,similarity calculation,clustering and cross-comparison on the information of 1173 Android applications.Through similarity analysis on three dimensions of features,we obtained some related regular pattern,which can assist kinds of development and management tasks on Android application such as excessive permission detection,re-packed detection,application description improvement,class library discovery and extraction of certain domain.Thereby it can help improve the ecology of Android market and improve the development efficiency of Android application.

Key words: Android applications,Functional description,Permission,Source code,Similarity

[1] Smartphone OS market share,Q3 2014.[2014-12-14].
[2] Zhou W,Zhou Y,Jiang X,et al.Detecting repackaged smartphone applications in third-party android marketplaces[C]∥Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy,2012.ACM,2012:317-326
[3] Zhou Y,Jiang X.Dissecting android malware:Characterization and evolution[C]∥IEEE Symposium on Security and Privacy,2012.IEEE,2012:95-109
[4] Zhu Jiao,Li Hong-wei,Peng Xin,et al.On Relationship of Functions and Permissions in Android Applications[J].Computer Applications and Software,2014,1(10):27-33
[5] F-Droid | Free and Open Source Android App Repository.[2014-12-14] .
[6] Manifest.permission.[2014-12-14].
[7] Miller G A,Beckwith R,Fellbaum C,et al.Introduction to word-net:An on-line lexical database[J].International Journal of Lexicography,1990,3(4):235-244
[8] Wu Z,Palmer M.Verbs semantics and lexical selection[C]∥Proceedings of the 32nd Annual Meeting on Association for Computational Linguistics,1994.1994:133-138
[9] Jaccard_index.[2014-12-14].
[10] Kamiya T,Kusumoto S,Inoue K.CCFinder:a multilinguistic token-based code clone detection system for large scale source code[J].IEEE Transactions on Software Engineering,2002,28(7):654-670
[11] Google Play.[2014-12-14].
[12] Spectral Clusterer for WEKA.[2014-12-14].
[13] Spectral Clustering.[2014-12-14].
[14] ActionBarSherlock.[2014-12-14].
[15] Jiang H,Ma H,Ren Z,et al.What makes a good app description?[C]∥Proceedings of the 6th Asia-Pacific Symposium on Internetware,2014.ACM,2014:45-53
[16] Pandita R,Xiao X,Yang W,et al.WHYPER:Towards Automating Risk Assessment of Mobile Applications[C]∥Proceedings of the 22nd Conference on USENIX Security Symposium,2013.2013:527-542
[17] Gorla A,Tavecchia I,Gross F,et al.Checking app behavioragainst app descriptions[C]∥ Proceedings of the 36th International Conference on Software Engineering,2014.ACM,2014:1025-1035
[18] Hanna S,Huang L,Wu E,et al.Juxtapp:A scalable system for detecting code reuse among android applications[M]∥Detection of Intrusions and Malware,and Vulnerability Assessment.Springer Berlin Heidelberg,2013:62-81
[19] Sun X,Zhongyang Y,Xin Z,et al.Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph[M]∥ICT Systems Security and Privacy Protection.Springer Berlin Heidelberg,2014:142-155

No related articles found!
Full text



No Suggested Reading articles found!