DOI QR코드

DOI QR Code

Android Game Repackaging Detection Technique using Shortened Instruction Sequence

축약된 인스트럭션 시퀀스를 이용한 안드로이드 게임 리패키징 탐지 기법

  • Lee, Gi Seong (Graduate School of Information Security, Korea University) ;
  • Kim, Huy Kang (Graduate School of Information Security, Korea University)
  • 이기성 (고려대학교 정보보호대학원) ;
  • 김휘강 (고려대학교 정보보호대학원)
  • Received : 2013.10.25
  • Accepted : 2013.11.19
  • Published : 2013.12.20

Abstract

Repackaging of mobile games is serious problem in the Android environment. In this paper, we propose a repackaging detection technique using shortened instruction sequence. By using shortened instruction sequence, the proposed technique can be applicable to a mobile device and can block repackaged apps coming from various sources. In the experiment, our technique showed high accuracy of repackaging detection.

모바일 기기의 성능 향상과 사용자 증가에 따라 모바일 게임 시장이 확대되고 다양한 모바일 게임들이 등장하고 있다. 하지만 이와 더불어 최근 모바일 게임에 대한 다양하고 심각한 보안 위협들이 나타나고 있으며 이에 대한 대응방안 마련이 필요한 상황이다. 특히 안드로이드 환경에서 모바일 게임의 리패키징은 모바일 게임 사용자와 제작자 그리고 생태계에 심각한 문제를 야기시킨다. 본 논문에서는 축약된 인스트럭션 시퀀스를 이용하여 안드로이드 게임의 리패키징 여부를 탐지하는 기법을 제안하고 구현하였으며 실험을 통해 제안한 기법이 효과적으로 리패키징 여부를 탐지할 수 있음을 보였다. 제안한 기법은 축약된 인스트럭션 시퀀스를 이용하기 때문에 여러 제약사항이 많은 모바일 기기에 적용이 가능하며 이를 통해 다양한 경로에서 유입되는 리패키징된 앱을 탐지 및 차단하고 리패키징으로 발생하는 악성 앱의 확산과 불법복제를 예방할 수 있다.

Keywords

References

  1. Jae-Hong Lee, "The Study on Arbitration of Contents Dispute in Mobile Game", Journal of Korea Game Society, Vol. 13, No. 3, 2013. https://doi.org/10.7583/JKGS.2013.13.3.121
  2. Ministry of Culture, Sports and Tourism, "White Paper on Korean Games", Oct. 2012.
  3. Juniper Networks Mobile Threat Center, "Third Annual Mobile Threats Report: March 2012 through March 2013", May 2013.
  4. Microsoftwre, "Concealing malicious code... mobile game in Black Market", August 2013.
  5. Jisun Choi, "Protecting Game Developers Under the Works-for-hire Clause of Copyright Law", Journal of Korea Game Society, Vol. 11, No 4, 2012.
  6. DigitalDaily, "Copyright Committee, Defend Smart Industry", Dec. 2011
  7. Huy Kang Kim, Young Jun Kum, "Security issue of mobile game service on Android environment", Review of Korea Institute of Information Security and Cryptology, Vol. 23, No. 2, April 2013.
  8. Soonil Kim, Sunghoon Kim, Dong Hoon Lee, "A Study on the vulnerability of integrity verification functions of android-based smartphone banking application", Journal of Korea Institute of Information Security and Cryptology, Vol. 23, No. 4, August 2013.
  9. Y. Zhou, X. Jiang, "Dissecting Android Malware: Characterization and Evolution", In Proc. of the 33rd IEEE Symposium on Security and Privacy, May 2012.
  10. Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning, "Detecting Repackaged Smartphone Application in Third-Party Android Marketplaces", In Proc. of the 2nd ACM Conference on Data and Application Security and Privacy, February 2012.
  11. Xuxian Jiang, "Security Alert: New Sophisticated Android Malware DroidKungFu Found in Alternative Chinese App Markets", June 2011.
  12. INCA Internet, "Repackaged FastRacing game application leaks your smartphone information", June 2011.
  13. Kaspersky Lab. Security News, "Researchers Find Methods For Bypassing Google's Bouncer Android Security", June 2012.
  14. Justin Case, "Report: Google's Android Market License Verification Easily Circumvented, Will Not Stop Pirates", August 2010.
  15. Yuxue Piao, Jin-hyuk Jung, Jeong Hyun Yi, "Structural and Functional Analyses of Proguard Obfuscation Tool", The Journal of Korea Information and Communication Society, Vol. 38, No. 8, August 2013. https://doi.org/10.7840/kics.2013.38B.8.654
  16. Chan-Hee Lee, Yeong-Ung Park, Ji-Hyeng Lim, Hong-Geun Kim, Choong-Hyun Lee, Seong-Je Cho, Jaesoo Yang, "Access Control Mechanism Preventing Application Piracy on the Android Platform", Journal of Computing Science and Engineering, Vol. 18, No. 10, Oct. 2012.
  17. Wu Zhou, Xinwen Zhang, Xuxian Jiang, "AppInk: Watermarking Android Apps for Repackaging Deterrence", In Proc. of the 8th ACM SIGSAC symposium on Information, computer and communications security, May 2013.
  18. Young Nam Joun, Woo Hyun Ahn, "Detecting Repackaged Applications using the Information of App Installation in Android Smartphones", Journal of Convergence Security, Vol. 12, No. 4, September 2012.
  19. BooJoong Kang, Yeoreum Lee, Eul Gyu Im, "Malware Family Detection Method using Instruction Frequency Sequence", Journal of Security Engineering, Vol. 10, No. 1, February 2013.
  20. Min Zheng, Patrick P.C.Lee, John C.S.Lui, "ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-Virus System", In Proc. of the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 2012.