Cornerstone bible church westfield in2/19/2023 DECKARD: scalable and accurate tree-based detection of code clones. In Proceedings of the 33rd International Conference on Software Engineering, pages 756–765, 2011. Value-based program characterization and its application to software plagiarism detection. In Proceedings of the 6th International Conference on Trust and Trustworthy Computing, 2013. A framework for evaluating mobile app repackaging detection algorithm. Incremental code clone detection: a PDG-based approach. In Proceedings of the 9th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA ’12), 2012. Juxtapp: a scalable system for detecting code reuse among Android applications. In Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’13), pages 431–444, 2013. AdRob: examining the landscape and impact of Android application plagiarism. In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS ’13), 2013. Scalable semantics-based detection of similar Android applications. In Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS ’12), 2012. Attack of the clones: detecting cloned applications on Android markets. In Proceedings of the 2010 International Conference on Software Maintenance (ICSM ’10), pages 1–5, 2010. A tree kernel based approach for clone detection. In Proceedings of the Thirty-Seventh Australasian Computer Science Conference (ACSC), pages 105–114, 2014. A replication and reproduction of code clone detection studies. In Proceedings of the 36th International Conference on Software Engineering (ICSE ’14), 2014. Achieving accuracy and scalability simultaneously in detecting application clones on Android markets. Duplicate code detection using anti-unification. In Proceedings of the 1998 International Conference on Software Maintenance (ICSM), 1998. Clone detection using abstract syntax trees. Parameterized pattern matching: algorithms and applications. On finding duplication and near-duplication in large software systems. In Computer Science and Statistics: Proc. A program for identifying duplicated code. Smali: An assembler/disassembler for Android’s dex format.02/20/a-list-of-shared-libraries-and-adlibraries-used-in-android-apps/, 2014. A list of shared libraries and Ad libraries used in Android apps.technotes/tools/solaris/keytool.html, 2014. 0/android-activations-app-downloads/, 2013. Daily Android activations grow to 1.5 million, Google Play surpasses 50 billion downloads.Experiments on more than 100,000 Android apps collected from five Android markets demonstrate the effectiveness and scalability of our approach. To further improve the detection speed and accuracy, we also introduce an automated clustering-based preprocessing step to filter third-party libraries before conducting app clone detection. This paper proposes WuKong, a two-phase detection approach that includes a coarse-grained detection phase to identify suspicious apps by comparing light-weight static semantic features, and a fine-grained phase to compare more detailed features for only those apps found in the first phase. However, fine-grained techniques employing complicated clone detection algorithms are difficult to scale to hundreds of thousands of apps, while coarse-grained techniques based on simple features are scalable but less accurate. Both fine-grained and coarse-grained approaches have been proposed to detect app clones. Repackaged Android applications (app clones) have been found in many third-party markets, which not only compromise the copyright of original authors, but also pose threats to security and privacy of mobile users.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |