Browse > Article
http://dx.doi.org/10.7583/JKGS.2013.13.6.85

Android Game Repackaging Detection Technique using Shortened Instruction Sequence  

Lee, Gi Seong (Graduate School of Information Security, Korea University)
Kim, Huy Kang (Graduate School of Information Security, Korea University)
Abstract
Repackaging of mobile games is serious problem in the Android environment. In this paper, we propose a repackaging detection technique using shortened instruction sequence. By using shortened instruction sequence, the proposed technique can be applicable to a mobile device and can block repackaged apps coming from various sources. In the experiment, our technique showed high accuracy of repackaging detection.
Keywords
Android Game Security; Repackaging Detection; Instruction Sequence;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 Jae-Hong Lee, "The Study on Arbitration of Contents Dispute in Mobile Game", Journal of Korea Game Society, Vol. 13, No. 3, 2013.   과학기술학회마을   DOI   ScienceOn
2 Ministry of Culture, Sports and Tourism, "White Paper on Korean Games", Oct. 2012.
3 Juniper Networks Mobile Threat Center, "Third Annual Mobile Threats Report: March 2012 through March 2013", May 2013.
4 Microsoftwre, "Concealing malicious code... mobile game in Black Market", August 2013.
5 Jisun Choi, "Protecting Game Developers Under the Works-for-hire Clause of Copyright Law", Journal of Korea Game Society, Vol. 11, No 4, 2012.   과학기술학회마을
6 DigitalDaily, "Copyright Committee, Defend Smart Industry", Dec. 2011
7 Huy Kang Kim, Young Jun Kum, "Security issue of mobile game service on Android environment", Review of Korea Institute of Information Security and Cryptology, Vol. 23, No. 2, April 2013.
8 Soonil Kim, Sunghoon Kim, Dong Hoon Lee, "A Study on the vulnerability of integrity verification functions of android-based smartphone banking application", Journal of Korea Institute of Information Security and Cryptology, Vol. 23, No. 4, August 2013.
9 Y. Zhou, X. Jiang, "Dissecting Android Malware: Characterization and Evolution", In Proc. of the 33rd IEEE Symposium on Security and Privacy, May 2012.
10 Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning, "Detecting Repackaged Smartphone Application in Third-Party Android Marketplaces", In Proc. of the 2nd ACM Conference on Data and Application Security and Privacy, February 2012.
11 Xuxian Jiang, "Security Alert: New Sophisticated Android Malware DroidKungFu Found in Alternative Chinese App Markets", June 2011.
12 INCA Internet, "Repackaged FastRacing game application leaks your smartphone information", June 2011.
13 Kaspersky Lab. Security News, "Researchers Find Methods For Bypassing Google's Bouncer Android Security", June 2012.
14 Justin Case, "Report: Google's Android Market License Verification Easily Circumvented, Will Not Stop Pirates", August 2010.
15 Young Nam Joun, Woo Hyun Ahn, "Detecting Repackaged Applications using the Information of App Installation in Android Smartphones", Journal of Convergence Security, Vol. 12, No. 4, September 2012.   과학기술학회마을
16 Yuxue Piao, Jin-hyuk Jung, Jeong Hyun Yi, "Structural and Functional Analyses of Proguard Obfuscation Tool", The Journal of Korea Information and Communication Society, Vol. 38, No. 8, August 2013.   과학기술학회마을   DOI   ScienceOn
17 Chan-Hee Lee, Yeong-Ung Park, Ji-Hyeng Lim, Hong-Geun Kim, Choong-Hyun Lee, Seong-Je Cho, Jaesoo Yang, "Access Control Mechanism Preventing Application Piracy on the Android Platform", Journal of Computing Science and Engineering, Vol. 18, No. 10, Oct. 2012.   과학기술학회마을
18 Wu Zhou, Xinwen Zhang, Xuxian Jiang, "AppInk: Watermarking Android Apps for Repackaging Deterrence", In Proc. of the 8th ACM SIGSAC symposium on Information, computer and communications security, May 2013.
19 BooJoong Kang, Yeoreum Lee, Eul Gyu Im, "Malware Family Detection Method using Instruction Frequency Sequence", Journal of Security Engineering, Vol. 10, No. 1, February 2013.
20 Min Zheng, Patrick P.C.Lee, John C.S.Lui, "ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-Virus System", In Proc. of the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 2012.