Abstract
Android is one of the most successful OS for smart devices and its large user base has‚ inevitably‚ made it the most targeted mobile OS by malwares. Android malwares have been found to have a host of different motives but most use repackaged apps as the preferred means of propagation into users' devices. This is done to exploit the popularity and trustworthiness of a legitimate app. The repackaged versions of the apps ask for more privileges at the time of installation and innocent‚ or ignorant‚ users install the app anyway. In this paper‚ we propose a framework for automatic detection of repackaged apps. Our framework determines whether an app is asking for unnecessary privileges by leveraging the original manifest information of the app. The developer needs to provide the manifest information at the time of releasing the app. When a new app is installed‚ the user is simply informed whether the app is safe or not. Our solution incurs an ignorable overhead on the Smartphone devices. It can provide highly accurate detection of repackaged version of any known app.
Keywords: Android, Broadcast actions, Package name, Permissions, Repackaging.
Graphical Abstract
International Journal of Sensors, Wireless Communications and Control
Title:A Framework to Detect Repackaged Android Applications in Smartphone Devices
Volume: 5 Issue: 1
Author(s): Sajal Rastogi, Kriti Bhushan and Brij B. Gupta
Affiliation:
Keywords: Android, Broadcast actions, Package name, Permissions, Repackaging.
Abstract: Android is one of the most successful OS for smart devices and its large user base has‚ inevitably‚ made it the most targeted mobile OS by malwares. Android malwares have been found to have a host of different motives but most use repackaged apps as the preferred means of propagation into users' devices. This is done to exploit the popularity and trustworthiness of a legitimate app. The repackaged versions of the apps ask for more privileges at the time of installation and innocent‚ or ignorant‚ users install the app anyway. In this paper‚ we propose a framework for automatic detection of repackaged apps. Our framework determines whether an app is asking for unnecessary privileges by leveraging the original manifest information of the app. The developer needs to provide the manifest information at the time of releasing the app. When a new app is installed‚ the user is simply informed whether the app is safe or not. Our solution incurs an ignorable overhead on the Smartphone devices. It can provide highly accurate detection of repackaged version of any known app.
Export Options
About this article
Cite this article as:
Rastogi Sajal, Bhushan Kriti and B. Gupta Brij, A Framework to Detect Repackaged Android Applications in Smartphone Devices, International Journal of Sensors, Wireless Communications and Control 2015; 5 (1) . https://dx.doi.org/10.2174/2210327905999150521110048
DOI https://dx.doi.org/10.2174/2210327905999150521110048 |
Print ISSN 2210-3279 |
Publisher Name Bentham Science Publisher |
Online ISSN 2210-3287 |

- Author Guidelines
- Bentham Author Support Services (BASS)
- Graphical Abstracts
- Fabricating and Stating False Information
- Research Misconduct
- Post Publication Discussions and Corrections
- Publishing Ethics and Rectitude
- Increase Visibility of Your Article
- Archiving Policies
- Peer Review Workflow
- Order Your Article Before Print
- Promote Your Article
- Manuscript Transfer Facility
- Editorial Policies
- Allegations from Whistleblowers
- Announcements