Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark
Repackaging is a serious threat to the Android ecosystem as it deprives app developers of their benefits, contributes to spreading malware on users' devices, and increases the workload of market maintainers. In the space of six years, the research around this specific issue has produced 57 appr...
Saved in:
| Published in | IEEE transactions on software engineering Vol. 47; no. 4; pp. 676 - 693 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
IEEE
01.04.2021
IEEE Computer Society |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0098-5589 1939-3520 2326-3881 1939-3520 |
| DOI | 10.1109/TSE.2019.2901679 |
Cover
| Abstract | Repackaging is a serious threat to the Android ecosystem as it deprives app developers of their benefits, contributes to spreading malware on users' devices, and increases the workload of market maintainers. In the space of six years, the research around this specific issue has produced 57 approaches which do not readily scale to millions of apps or are only evaluated on private datasets without, in general, tool support available to the community. Through a systematic literature review of the subject, we argue that the research is slowing down, where many state-of-the-art approaches have reported high-performance rates on closed datasets, which are unfortunately difficult to replicate and to compare against. In this work, we propose to reboot the research in repackaged app detection by providing a literature review that summarises the challenges and current solutions for detecting repackaged apps and by providing a large dataset that supports replications of existing solutions and implications of new research directions. We hope that these contributions will re-activate the direction of detecting repackaged apps and spark innovative approaches going beyond the current state-of-the-art. |
|---|---|
| AbstractList | Repackaging is a serious threat to the Android ecosystem as it deprives app developers of their benefits, contributes to spreading malware on users' devices, and increases the workload of market maintainers. In the space of six years, the research around this specific issue has produced 57 approaches which do not readily scale to millions of apps or are only evaluated on private datasets without, in general, tool support available to the community. Through a systematic literature review of the subject, we argue that the research is slowing down, where many state-of-the-art approaches have reported high-performance rates on closed datasets, which are unfortunately difficult to replicate and to compare against. In this work, we propose to reboot the research in repackaged app detection by providing a literature review that summarises the challenges and current solutions for detecting repackaged apps and by providing a large dataset that supports replications of existing solutions and implications of new research directions. We hope that these contributions will re-activate the direction of detecting repackaged apps and spark innovative approaches going beyond the current state-of-the-art. |
| Author | Li, Li Klein, Jacques Bissyande, Tegawende F. |
| Author_xml | – sequence: 1 givenname: Li orcidid: 0000-0003-2990-1614 surname: Li fullname: Li, Li email: li.li@monash.edu organization: Faculty of Information Technology, Monash University, Clayton, VIC, Australia – sequence: 2 givenname: Tegawende F. orcidid: 0000-0001-7270-9869 surname: Bissyande fullname: Bissyande, Tegawende F. email: tegawende.bissyande@uni.lu organization: Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Esch-sur-Alzette, Luxembourg – sequence: 3 givenname: Jacques orcidid: 0000-0003-4052-475X surname: Klein fullname: Klein, Jacques email: jacques.klein@uni.lu organization: Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Esch-sur-Alzette, Luxembourg |
| BookMark | eNp9kM1LAzEQxYMo2FbvgpcFz1uTZtPdeKtaP6Ag-AHelkl2to3WZE1Sxf_elBYPCsLAwPDem8evT3ats0jIEaNDxqg8fXyYDkeUyeFIUjYu5Q7pMcllzsWI7pIepbLKhajkPumH8EIpFWUpeuT5HpVz0dh5do8BwetF5mx2iRH19tqBfoU5NtnENt6ZtLsunGUzE9FDXHlMmg-DnxnYJjtHqxdv4F8PyF4Ly4CH2z0gT1fTx4ubfHZ3fXsxmeWacx7zFjTySqVRjaYMFAqqigaERI1KMtUqCY0slYZGS6Aai7bgIBpWpgMWfEDYJndlO_j6hOWy7rxJDb5qRus1mjoGrNdo6i2a5DnZeDrv3lcYYv3iVt6mmvVIMFElZGORVHSj0t6F4LH9E5yY_w4e_7JoEyEaZ6MHs_zPeLwxGkT8-VOlFgWV_BtkqZFA |
| CODEN | IESEDJ |
| CitedBy_id | crossref_primary_10_3233_JCS_191313 crossref_primary_10_1109_ACCESS_2019_2944684 crossref_primary_10_1007_s10664_019_09760_3 crossref_primary_10_1109_TDSC_2024_3358979 crossref_primary_10_1109_TSE_2023_3236582 crossref_primary_10_1109_JIOT_2020_2981693 crossref_primary_10_26599_TST_2023_9010005 crossref_primary_10_1109_ACCESS_2024_3351945 crossref_primary_10_1145_3544968 crossref_primary_10_1016_j_cose_2020_101993 crossref_primary_10_1016_j_jisa_2023_103527 crossref_primary_10_1007_s12652_021_03023_0 crossref_primary_10_1016_j_eswa_2022_118705 crossref_primary_10_1109_TSE_2021_3114381 crossref_primary_10_1109_TDSC_2022_3178181 crossref_primary_10_1016_j_ins_2020_03_036 crossref_primary_10_1109_TSE_2021_3115506 crossref_primary_10_1007_s11390_021_1659_3 |
| Cites_doi | 10.1109/TMC.2014.2381212 10.1145/2568225.2568286 10.1109/AsiaJCIS.2012.18 10.1145/2642937.2642977 10.1109/ICSE.2017.38 10.1007/978-3-642-38908-5_13 10.1145/2931037.2931043 10.1109/ICSE.2007.30 10.1109/TIFS.2017.2656460 10.1007/978-3-319-24177-7_15 10.1145/2591971.2592003 10.1109/SANER.2016.52 10.1145/2983574 10.1145/2766498.2766508 10.1145/2556464.2556467 10.1016/j.scico.2009.02.007 10.1145/2133601.2133640 10.1587/transinf.2016ICP0012 10.1109/SPW.2016.33 10.1109/ICPC.2017.16 10.1145/1150402.1150522 10.1007/s11277-013-1258-x 10.1145/2771783.2771795 10.1145/3196398.3196412 10.1109/ICPC.2012.6240477 10.1016/j.jss.2006.07.009 10.1016/j.infsof.2017.04.001 10.1109/EISIC.2012.34 10.1145/2627393.2627395 10.1145/3151137.3151138 10.1109/TrustCom.2013.25 10.1145/2484313.2484315 10.1145/3106237.3106305 10.1016/j.cose.2013.08.010 10.1155/2017/6958698 10.1007/s10515-015-0182-6 10.1109/ICSM.1998.738528 10.1145/2751323.2751330 10.1109/ACSAC.2008.22 10.1109/ISSRE.2018.00031 10.1109/HICSS.2012.114 10.1109/SAI.2015.7237151 10.1007/978-3-319-45719-2_11 10.1145/2976749.2978333 10.1007/978-3-642-28166-2_11 10.1109/TrustCom.2016.0104 10.1109/ICPC.2016.7503721 10.1002/cpe.3447 10.1007/978-3-319-47560-8_9 10.1109/WCRE.1995.514697 10.1109/MS.2013.142 10.1109/ICPC.2015.25 10.1145/3106237.3121277 10.1109/ICPC.2011.26 10.1145/2931037.2931044 10.1145/2664243.2664275 10.1145/2568225.2568324 10.1145/2435349.2435378 10.1145/2597073.2597109 10.1145/2557547.2557558 10.1007/978-3-540-73547-2_48 10.1109/TDSC.2017.2745575 10.1109/ICSAI.2016.7811010 10.1109/DICTAP.2016.7544005 10.1007/s11623-013-0300-1 10.1109/TIFS.2017.2687880 10.1145/2435349.2435377 10.1007/978-3-319-26362-5_17 10.1007/978-3-319-30806-7_6 10.1007/978-3-319-04283-1_13 10.1109/79.543975 10.1002/sec.1170 10.1109/TSE.2009.16 10.1109/TR.2018.2865733 10.1109/Trustcom/BigDataSE/ICESS.2017.230 10.1145/2523514.2523539 10.1007/s11390-015-1573-7 10.1016/j.jisa.2014.10.011 |
| ContentType | Journal Article |
| Copyright | Copyright IEEE Computer Society 2021 |
| Copyright_xml | – notice: Copyright IEEE Computer Society 2021 |
| DBID | 97E RIA RIE AAYXX CITATION JQ2 K9. ADTOC UNPAY |
| DOI | 10.1109/TSE.2019.2901679 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef ProQuest Computer Science Collection ProQuest Health & Medical Complete (Alumni) Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef ProQuest Health & Medical Complete (Alumni) ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Health & Medical Complete (Alumni) |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1939-3520 |
| EndPage | 693 |
| ExternalDocumentID | oai:orbilu.uni.lu:10993/41965 10_1109_TSE_2019_2901679 8653409 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: University of Luxembourg, under the VulFix project – fundername: Monash-Warwick Alliance Catalyst Fund (2018/2019) – fundername: European Union, under the SPARTA project – fundername: Fonds National de la Recherche, Luxembourg grantid: CHARACTERIZE C17/IS/11693861; Recommend C15/IS/10449467 funderid: 10.13039/501100001866 |
| GroupedDBID | --Z -DZ -~X .DC 0R~ 29I 4.4 5GY 6IK 85S 8R4 8R5 97E AAJGR AARMG AASAJ AAWTH ABAZT ABPPZ ABQJQ ABVLG ACGFO ACGOD ACIWK ACNCT AENEX AGQYO AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BKOMP BPEOZ CS3 DU5 EBS EDO EJD HZ~ I-F IEDLZ IFIPE IPLJI JAVBF LAI M43 MS~ O9- OCL P2P Q2X RIA RIE RNS RXW S10 TAE TN5 TWZ UHB UPT WH7 YZZ AAYXX CITATION JQ2 K9. .4S 3EH 5VS 7WY 7X7 88E 88I 8FE 8FG 8FI 8FJ 8FL 8G5 9M8 ABFSI ABJCF ABUWG ADBBV ADTOC AETIX AFKRA AGSQL AI. AIBXA ALLEH ARAPS ARCSS AZQEC BENPR BEZIV BGLVJ BPHCQ BVXVI CCPQU DWQXO E.L FRNLG FYUFA GNUQQ GROUPED_ABI_INFORM_RESEARCH GUQSH HCIFZ HMCUK H~9 IBMZZ ICLAB IFJZH ITG ITH K60 K6V K6~ K7- L6V M0C M1P M1Q M2O M2P M7S OHT P62 PHGZM PHGZT PJZUB PPXIY PQBIZ PQBZA PQGLB PQQKQ PROAC PSQYO PTHSS RNI RZB UKHRP UNPAY UQL VH1 XOL YYP ZCG |
| ID | FETCH-LOGICAL-c333t-face38b38bbdc01abe50b4da59eceb91bfb9ad97bcadc9a0ce4f43a5d17adce43 |
| IEDL.DBID | UNPAY |
| ISSN | 0098-5589 1939-3520 2326-3881 |
| IngestDate | Sun Oct 26 04:15:47 EDT 2025 Fri Oct 03 04:11:35 EDT 2025 Wed Oct 01 02:36:04 EDT 2025 Thu Apr 24 22:57:07 EDT 2025 Wed Aug 27 02:30:54 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 cc-by-nc-sa |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c333t-face38b38bbdc01abe50b4da59eceb91bfb9ad97bcadc9a0ce4f43a5d17adce43 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-7270-9869 0000-0003-4052-475X 0000-0003-2990-1614 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=http://orbilu.uni.lu/handle/10993/41965 |
| PQID | 2515852065 |
| PQPubID | 21418 |
| PageCount | 18 |
| ParticipantIDs | crossref_primary_10_1109_TSE_2019_2901679 crossref_citationtrail_10_1109_TSE_2019_2901679 proquest_journals_2515852065 unpaywall_primary_10_1109_tse_2019_2901679 ieee_primary_8653409 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2021-04-01 |
| PublicationDateYYYYMMDD | 2021-04-01 |
| PublicationDate_xml | – month: 04 year: 2021 text: 2021-04-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on software engineering |
| PublicationTitleAbbrev | TSE |
| PublicationYear | 2021 |
| Publisher | IEEE IEEE Computer Society |
| Publisher_xml | – name: IEEE – name: IEEE Computer Society |
| References | ref57 ref56 ref59 ref55 gibler (ref1) 2013 (ref79) 2016 ref51 chen (ref41) 2015 keele (ref13) 9 ref46 cochran (ref94) 1977 ref45 ref48 ref42 li (ref3) 2016 ref44 ref43 yang (ref85) 2015 ref49 ref8 ref7 ref9 allix (ref11) 2016 ref100 ref101 ref35 ref34 ref37 ref31 ref30 ref33 ref32 hanna (ref71) 2012 (ref90) 2016 ref39 ref38 ruiz (ref58) 2014; 31 roy (ref83) 2007 crussell (ref2) 2012 ref24 ref23 ref26 li (ref97) 2019 ref25 ref20 gonzalez (ref50) 2014 ref22 ref21 ref28 ref27 ref29 israel (ref95) 1992 zhauniarovich (ref53) 2014 lindorfer (ref47) 2014 gibler (ref60) 2013 ref15 ref14 ref96 ref99 (ref5) 2016 ref98 ref10 crussell (ref61) 2013 ref16 ref19 cesare (ref105) 2013; 127 ref18 desnos (ref74) 2011 jiao (ref40) 2015 ref91 kolter (ref106) 2006; 7 ref89 ref86 ref88 ref87 li (ref12) 2017 sun (ref52) 2014 kitchenham (ref17) 2004 ref82 ref81 ref84 ref108 ref78 ref109 gonzalez (ref36) 2015 ref107 ref75 ref104 ref77 ref102 ref103 (ref80) 2016 li (ref93) 2015 ref70 ref73 ref72 ref110 ref68 ref67 ref69 ref64 ref63 ref66 ref65 ankeny (ref4) 2012 (ref6) 2016 sebastián (ref92) 2016 kywe (ref54) 2014 ref62 ma (ref76) 2016 |
| References_xml | – ident: ref46 doi: 10.1109/TMC.2014.2381212 – ident: ref48 doi: 10.1145/2568225.2568286 – ident: ref69 doi: 10.1109/AsiaJCIS.2012.18 – ident: ref9 doi: 10.1145/2642937.2642977 – ident: ref75 doi: 10.1109/ICSE.2017.38 – year: 2016 ident: ref3 article-title: Ungrafting malicious code from piggybacked android apps publication-title: Tech Rep – ident: ref81 doi: 10.1007/978-3-642-38908-5_13 – ident: ref110 doi: 10.1145/2931037.2931043 – ident: ref103 doi: 10.1109/ICSE.2007.30 – ident: ref96 doi: 10.1109/TIFS.2017.2656460 – start-page: 468 year: 2016 ident: ref11 article-title: AndroZoo: Collecting Millions of Android Apps for the Research Community publication-title: 2016 IEEE/ACM 13th Conference on Mining Software Repositories (MSR) – ident: ref86 doi: 10.1007/978-3-319-24177-7_15 – ident: ref56 doi: 10.1145/2591971.2592003 – year: 2016 ident: ref5 article-title: Ustwo games – ident: ref31 doi: 10.1109/SANER.2016.52 – start-page: 142 year: 2014 ident: ref52 article-title: Detecting code reuse in android applications using component-based control flow graph publication-title: Proc IFIP Int Inf Security Conf – ident: ref99 doi: 10.1145/2983574 – start-page: 659 year: 2015 ident: ref41 article-title: Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale publication-title: Proc 24th USENIX Conf Security Symp – ident: ref39 doi: 10.1145/2766498.2766508 – year: 2017 ident: ref12 article-title: Androzoo++: Collecting millions of android apps and their metadata for the research community – ident: ref51 doi: 10.1145/2556464.2556467 – ident: ref98 doi: 10.1016/j.scico.2009.02.007 – ident: ref70 doi: 10.1145/2133601.2133640 – ident: ref23 doi: 10.1587/transinf.2016ICP0012 – ident: ref28 doi: 10.1109/SPW.2016.33 – ident: ref24 doi: 10.1109/ICPC.2017.16 – ident: ref82 doi: 10.1145/1150402.1150522 – ident: ref7 doi: 10.1007/s11277-013-1258-x – ident: ref45 doi: 10.1145/2771783.2771795 – start-page: 241 year: 2014 ident: ref54 article-title: Detecting camouflaged applications on mobile application markets publication-title: Proc Int Conf Inf Security Cryptology – ident: ref10 doi: 10.1145/3196398.3196412 – ident: ref73 doi: 10.1109/ICPC.2012.6240477 – ident: ref14 doi: 10.1016/j.jss.2006.07.009 – ident: ref15 doi: 10.1016/j.infsof.2017.04.001 – ident: ref108 doi: 10.1109/EISIC.2012.34 – ident: ref59 doi: 10.1145/2627393.2627395 – ident: ref26 doi: 10.1145/3151137.3151138 – ident: ref65 doi: 10.1109/TrustCom.2013.25 – start-page: 182 year: 2013 ident: ref61 article-title: Andarwin: Scalable detection of semantically similar android applications publication-title: Proc Eur Symp Res Comput Security – start-page: 653 year: 2016 ident: ref76 article-title: LibRadar: Fast and Accurate Detection of Third-Party Libraries in Android Apps publication-title: 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C) ICSE-C – year: 9 ident: ref13 article-title: Guidelines for performing systematic literature reviews in software engineering – start-page: 459 year: 2013 ident: ref60 article-title: Adrob: Examining the landscape and impact of android application plagiarism publication-title: Proc 11th Annu Int Conf Mobile Syst Appl services – ident: ref63 doi: 10.1145/2484313.2484315 – ident: ref19 doi: 10.1145/3106237.3106305 – start-page: 436 year: 2014 ident: ref50 article-title: Droidkin: Lightweight detection of android apps similarity publication-title: Proc Int Conf Security Privacy Commun Syst – ident: ref67 doi: 10.1016/j.cose.2013.08.010 – ident: ref22 doi: 10.1155/2017/6958698 – start-page: 280 year: 2015 ident: ref93 article-title: IccTA: detecting inter-component privacy leaks in Android apps publication-title: Proceedings of the International Conference on Software Engineering ICSE'94 – year: 2016 ident: ref79 article-title: Dexguard – ident: ref35 doi: 10.1007/s10515-015-0182-6 – start-page: 37 year: 2012 ident: ref2 article-title: Attack of the clones: Detecting cloned applications on android markets publication-title: Proc Eur Symp Res Comput Security – ident: ref102 doi: 10.1109/ICSM.1998.738528 – year: 2015 ident: ref36 article-title: Exploring reverse engineering symptoms in android apps publication-title: Proc 8th Eur Workshop Syst Security doi: 10.1145/2751323.2751330 – ident: ref109 doi: 10.1109/ACSAC.2008.22 – ident: ref78 doi: 10.1109/ISSRE.2018.00031 – ident: ref68 doi: 10.1109/HICSS.2012.114 – ident: ref88 doi: 10.1109/SAI.2015.7237151 – start-page: 230 year: 2016 ident: ref92 article-title: Avclass: A tool for massive malware labeling publication-title: Proc Int Symp Res Attacks Intrusions Defenses doi: 10.1007/978-3-319-45719-2_11 – ident: ref77 doi: 10.1145/2976749.2978333 – ident: ref72 doi: 10.1007/978-3-642-28166-2_11 – start-page: 62 year: 2012 ident: ref71 article-title: Juxtapp: A scalable system for detecting code reuse among android applications publication-title: Proceedings of the 4th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment – year: 2016 ident: ref90 article-title: Androguard: Reverse engineering, malware analysis of android applications – year: 1992 ident: ref95 article-title: Determining sample size publication-title: Program Evaluation and Organizational Development IFAS University of Florida – start-page: 349 year: 2015 ident: ref40 article-title: A rapid and scalable method for android application repackaging detection publication-title: Proc Int Conf Inf Security Practice Experience – start-page: 130 year: 2014 ident: ref53 article-title: Fsquadra: Fast detection of repackaged applications publication-title: Proc IFIP Annu Conf Data Appl Security Privacy – ident: ref34 doi: 10.1109/TrustCom.2016.0104 – ident: ref27 doi: 10.1109/ICPC.2016.7503721 – ident: ref42 doi: 10.1002/cpe.3447 – ident: ref30 doi: 10.1007/978-3-319-47560-8_9 – ident: ref101 doi: 10.1109/WCRE.1995.514697 – volume: 31 start-page: 78 year: 2014 ident: ref58 article-title: A large scale empirical study on software reuse in mobile apps publication-title: IEEE Softw doi: 10.1109/MS.2013.142 – year: 2012 ident: ref4 article-title: Feds seize android app marketplaces applanet, appbucket in piracy sting – ident: ref43 doi: 10.1109/ICPC.2015.25 – ident: ref18 doi: 10.1145/3106237.3121277 – start-page: 51 year: 2014 ident: ref47 article-title: Andradar: Fast discovery of android applications in alternative markets publication-title: Detection of Intrusions and Malware and Vulnerability Assessment – ident: ref89 doi: 10.1109/ICPC.2011.26 – ident: ref84 doi: 10.1145/2931037.2931044 – ident: ref57 doi: 10.1145/2664243.2664275 – ident: ref100 doi: 10.1145/2568225.2568324 – ident: ref64 doi: 10.1145/2435349.2435378 – year: 2016 ident: ref80 article-title: Sandmark: A tool for the study of software protection algorithms – ident: ref55 doi: 10.1145/2597073.2597109 – year: 1977 ident: ref94 publication-title: Sampling Techniques – year: 2007 ident: ref83 article-title: A survey on software clone detection research – year: 2019 ident: ref97 article-title: Baseline approach for repackaged app detection: A supplement document of the research paper entitled "rebooting research on detecting repackaged android apps: Literature review and benchmark – ident: ref49 doi: 10.1145/2557547.2557558 – ident: ref107 doi: 10.1007/978-3-540-73547-2_48 – ident: ref20 doi: 10.1109/TDSC.2017.2745575 – ident: ref32 doi: 10.1109/ICSAI.2016.7811010 – start-page: 431 year: 2013 ident: ref1 article-title: Adrob: Examining the landscape and impact of android application plagiarism publication-title: Proc 11th Annu Int Conf Mobile Syst Appl Serv – ident: ref29 doi: 10.1109/DICTAP.2016.7544005 – start-page: 77 year: 2011 ident: ref74 article-title: Android: From reversing to decompilation publication-title: Proc Black Hat Abu Dhabi – ident: ref87 doi: 10.1007/s11623-013-0300-1 – ident: ref8 doi: 10.1145/2484313.2484315 – ident: ref21 doi: 10.1109/TIFS.2017.2687880 – ident: ref66 doi: 10.1145/2435349.2435377 – start-page: 359 year: 2015 ident: ref85 article-title: Appspear: Bytecode decrypting and dex reassembling for packed android malware publication-title: Proc 18th Int Symp Res Attacks Intrusions Defenses doi: 10.1007/978-3-319-26362-5_17 – ident: ref33 doi: 10.1007/978-3-319-30806-7_6 – volume: 127 start-page: 197 year: 2013 ident: ref105 article-title: Clonewise - detecting package-level clones using machine learning publication-title: Proc Int Conf Security Privacy Commun Netw doi: 10.1007/978-3-319-04283-1_13 – ident: ref91 doi: 10.1109/79.543975 – ident: ref44 doi: 10.1002/sec.1170 – ident: ref104 doi: 10.1109/TSE.2009.16 – ident: ref16 doi: 10.1109/TR.2018.2865733 – ident: ref25 doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.230 – ident: ref62 doi: 10.1145/2523514.2523539 – ident: ref38 doi: 10.1007/s11390-015-1573-7 – ident: ref37 doi: 10.1016/j.jisa.2014.10.011 – year: 2016 ident: ref6 article-title: Pokemon Go: New tampered apps & what you can do – volume: 7 start-page: 2721 year: 2006 ident: ref106 article-title: Learning to detect and classify malicious executables in the wild publication-title: J Mach Learn Res – year: 2004 ident: ref17 article-title: Procedures for performing systematic reviews |
| SSID | ssj0005775 ssib053395008 |
| Score | 2.5488393 |
| Snippet | Repackaging is a serious threat to the Android ecosystem as it deprives app developers of their benefits, contributes to spreading malware on users' devices,... Repackaging is a serious threat to the Android ecosystem as it deprives app developers of their benefits, contributes to spreading malware on users’ devices,... |
| SourceID | unpaywall proquest crossref ieee |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 676 |
| SubjectTerms | Aging Android Applications programs benchmark Bibliographies clone Cloning Datasets Libraries literature review Literature reviews Malware repackaging Systematics |
| SummonAdditionalLinks | – databaseName: IEEE Electronic Library (IEL) dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB4tXMoFaAGxBSofegGR3QTbSXyEFoSqLgce0t6isT0RaJfsCrKq4Ndj51VoK1QpUiLLiZ2MnfnG83kG4Gto05TrRAQx5mkglJEBOlwfoNKkwhxzXiWDGV3E5zfix1iOe3DY7YUhoop8RgN_Wfny7cws_FLZMI0lF3633lKSxvVerd90jiSRbXxMKVPVuiRDNby-OvUcLjXwPsPYk7ZeqaAqp8obePlhUczx6RdOp680zdkajNo-1gSTyWBR6oF5_iN84_--xDqsNpCTHddj5CP0qPgEa206B9bM7g0YX3rPqadBs5aPx2YF-07ez1CXOgN74n5Alnke5OzOneeuK-xnF5uZ1b4GhoVlJ-6xt_f4MNmEm7PT62_nQZN4ITCc8zLI0RBPtTu0NWGEmmSohUWpyJBWkc61QqsSbdAahaEhkQuO0kaJKyDBt2C5mBW0DQwxj5watjyXJBw2RoHcWXmJ5dZERmIfhq0sMtNEJffJMaZZZZ2EKnPSy7z0skZ6fdjv7pjXETneqbvhBdDVa759H3ZbcWfNlH3MHNBzptORg2R9OOiGwF9NlI_0ponP_25iB1aOPPul4vjswnL5sKA9B19K_aUaty_je-30 priority: 102 providerName: IEEE |
| Title | Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark |
| URI | https://ieeexplore.ieee.org/document/8653409 https://www.proquest.com/docview/2515852065 http://orbilu.uni.lu/handle/10993/41965 |
| UnpaywallVersion | submittedVersion |
| Volume | 47 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1939-3520 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0005775 issn: 0098-5589 databaseCode: RIE dateStart: 19750101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fi9QwEB5070FfPPUUV88jD74oZNtukm7zeOodi-ghegvrU5n8KHds7S57LaJ_vZP-WO9QFKFQCNMmZZLmG77JNwAvYpdlwswkT7HIuNRWcSRcz1Ebr-MCC9EWg_lwls4X8t1SLX-JJK235rJsApM7KZuoExqIAnkjIhm0727DXqoIdI9gb3H28fjLoIipVFvsjtCI5gQp4rak3DTlIsuSgZyMdVRfBWXMRE8Ce5iG9K1rm1FbXeUG0LzTVBv8_g3L8tqec7oP8-HkTpdqspo0tZnYH38QcvzH59yHez3uZMfdRHkAt3z1EPaHmg6sX-IHsPwU6NOQC82GpDy2rthbH8iGrpWi7BX9hRwLyZDrS7pvaJjs_U6gmXWEA6OBsNf02ouvuF09gsXpyfmbOe-rL3ArhKh5gdaLzNBlnI0TNF7FRjpU2ltvdGIKo9HpmbHorMbYellIgcolM2rwUjyGUbWu_BNgiEVCe7EThfKSADJKFBTqzZxwNrEKxxANbshtL00eKmSUeRuixDo__3ySB8flvePG8HL3xKaT5fiL7UHw7M4uS5WgqHYMh4On837dXuWE9ih-mhIuG8Ornfd_64Lm0Y0unv6P8TO4Ow2JMW36zyGM6m3jnxOyqc1Re_zwqJ_bPwEkcvM2 |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dT9swED8h9gAvMAaIDjb8wMumpU2w3cSP2wAV1vKwFalv0dm-aFO7tIJUaPvrZ-eLT01IkRJZTuzk7NzvfD_fARyFNkm4jkXQxywJhDIyQIfrA1SaVJhhxstkMKPL_uBKXEzkZAU-tXthiKgkn1HXX5a-fDs3S79U1kv6kgu_W--VFELIarfWHaEjjmUTIVPKRDVOyVD1xj9OPYtLdb3XsO9pW_eUUJlV5QHAXFvmC_xzi7PZPV1ztgmjppcVxWTaXRa6a_4-CuD40td4DRs16GSfq1GyBSuUv4HNJqEDq-f3Nky-e9-pJ0KzhpHH5jk7Ie9pqEqdiT11vyDLPBNy_sudF64rbNhGZ2aVt4FhbtkX99ifv_F6ugNXZ6fjr4OgTr0QGM55EWRoiCfaHdqaMEJNMtTColRkSKtIZ1qhVbE2aI3C0JDIBEdpo9gVkOC7sJrPc9oDhphFThFbnkkSDh2jQO7svNhyayIjsQO9RhapqeOS-_QYs7S0T0KVOumlXnppLb0OfGjvWFQxOf5Td9sLoK1Xf_sOHDTiTutJe5M6qOeMp2MHyjrwsR0CT5oobuhBE2-fb-IQ1gbj0TAdnl9-24f1Y8-FKRk_B7BaXC_pnQMzhX5fjuF_es3xQQ |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1da9RAFL3o9kFfrFrFrVXmwReF2SQ7M9nMY9WWRbSIdmF9Cnc-gmVjdtkmFP313snH2qIoQiAwTJIJdyZzLufmHIAXscsyYWaSp1hkXGqrOBKu56iN13GBhWjNYD6cpfOFfLdUy18iSeutuSibwOROyibqhAaiQN6ISAbtu9uwlyoC3SPYW5x9PP4yKGIq1ZrdERrRnCBF3FrKTVMusiwZyMlYR_VlUMZM9CSwh2ko37q2GbXuKjeA5p2m2uD3KyzLa3vO6T7Mhz93ulKT1aSpzcT--IOQ4z9e5z7c63EnO-4mygO45auHsD94OrB-iR_A8lOgT0MtNBuK8ti6Ym99IBu6VsqyV_QVciwUQ64v6LyhYbL3O4Fm1hEOjAbCXtNtv37D7eoRLE5Pzt_Mee--wK0QouYFWi8yQ4dxNk7QeBUb6VBpb73RiSmMRqdnxqKzGmPrZSEFKpfMqMFL8RhG1bryT4AhFgntxU4UyksCyChRUKo3c8LZxCocQzSEIbe9NHlwyCjzNkWJdX7--SQPgcv7wI3h5e6KTSfL8Ze-ByGyu35ZqgRltWM4GiKd9-v2Mie0R_nTlHDZGF7tov_bI2ge3XjE4f90fgp3p6Ewpi3_OYJRvW38M0I2tXnez-qfdmXyNQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Rebooting+Research+on+Detecting+Repackaged+Android+Apps%3A+Literature+Review+and+Benchmark&rft.jtitle=IEEE+transactions+on+software+engineering&rft.au=Li%2C+Li&rft.au=Bissyande%2C+Tegawende+F&rft.au=Klein%2C+Jacques&rft.date=2021-04-01&rft.pub=IEEE+Computer+Society&rft.issn=0098-5589&rft.eissn=1939-3520&rft.volume=47&rft.issue=4&rft.spage=676&rft_id=info:doi/10.1109%2FTSE.2019.2901679&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0098-5589&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0098-5589&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0098-5589&client=summon |