Abstract
The Android packaging model offers adequate opportunities for attackers to inject malicious code into popular benign apps, attempting to develop new malicious apps that can then be easily spread to a large user base. Despite the fact that the literature has already presented a number of tools to detect piggybacked apps, there is still lacking a comprehensive investigation on the piggybacking processes. To fill this gap, in this work, we collect a large set of benign/piggybacked app pairs that can be taken as benchmark apps for further investigation. We manually look into these benchmark pairs for understanding the characteristics of piggybacking apps and eventually we report 20 interesting findings. We expect these findings to initiate new research directions such as practical and scalable piggybacked app detection, explainable malware detection, and malicious code location.
Original language | English |
---|---|
Title of host publication | Proceedings |
Subtitle of host publication | 2017 IEEE/ACM 39th International Conference on Software Engineering Companion - ICSE-C 2017 |
Editors | Alessandro Orso, Martin Robillard |
Place of Publication | Piscataway NJ USA |
Publisher | IEEE, Institute of Electrical and Electronics Engineers |
Pages | 359-361 |
Number of pages | 3 |
ISBN (Print) | 9781538615898 |
DOIs | |
Publication status | Published - 30 Jun 2017 |
Externally published | Yes |
Event | International Conference on Software Engineering 2017 - Buenos Aires, Argentina Duration: 20 May 2017 → 28 May 2017 Conference number: 39th http://icse2017.gatech.edu/ |
Conference
Conference | International Conference on Software Engineering 2017 |
---|---|
Abbreviated title | ICSE-C 2017 |
Country | Argentina |
City | Buenos Aires |
Period | 20/05/17 → 28/05/17 |
Other | IEEE/ACM International Conference on Software Engineering Companion (ICSE-C 2017) |
Internet address |