Browse > Article
http://dx.doi.org/10.7472/jksii.2015.16.2.67

An Illegally-copied App Detecting Method by Using Odex File in Android Platform  

Cho, Dueckyoun (School of Computer Science and Engineering, Soongsil University)
Choi, Jaeyoung (School of Computer Science and Engineering, Soongsil University)
Kim, Eunhoe (Department of Internet Information, Seoil University)
Gang, Gi-Du (School of Business Administration, Soongsil University)
Publication Information
Journal of Internet Computing and Services / v.16, no.2, 2015 , pp. 67-75 More about this Journal
Abstract
According to the changes of the mobile environments, the usage and interest of the Android apps have been increased. But the usage of illegally-copied apps has been also increased. And the transparency and dependability of the app markets has been decreased. Therefore there are many cases for the copyright infringement of app developers. Although several methods for preventing illegally-copied apps have been studied, there may exist possible ways to bypass the methods. Since it is difficult to find out the first distributors of the illegally-copied apps, it is not easy to punish them legally. This paper proposes the method of detecting illegally-copied apps. The proposed detector can detect the illegally-copied apps using odex file, which is created when the app is installed. The detector can also find out the information of the first distributors based on forensic watermark technique. Since the illegally-copied app detector is running as a service on the system server, it is granted that the detector hides from the users. As an experiment result, the illegally-copied app detector takes on average within 0.2 seconds to detect and delete an illegally-copied app.
Keywords
illegally-copied app; detector; android platform; execution hiding; odex file;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Mincheol Kim, Jihyung Shin, Yunhwa Kim, Taelim Ha, Sun Shin, "2013 Korea Media Panel Research", Korea Information society development institute, 2013. http://www.kisdi.re.kr/kisdi/fp/kr/board/selectSingleBoar d.do?cmd=select SingleBoard&curPage=1&boardId=GPK_RND_DATA&seq=29270&reStep=8999&ctx=_
2 Mashable, Available at : http://www.mashable.com
3 Android LVL, Available at: http://developer.android.com/google/play/licensing/addin g-licensing.html
4 Hanbyul Baek, Eungyu Lee, Kanghee Kim, "A Mobile Application Anti-Piracy Technique Using Mandatory Access Control Based on User Preferences", Journal of Security Engineering, Vol.10, No.2, pp.151-162, 2013. http://www.sersc.org/journals/JSE/vol10_no2_2013/4.pdf
5 Sung-Ryul Kim, "Copy Protection System for Android App using Public Key Infrastructure", Journal of Security Engineering, Vol.9, No.1, pp.121-134, 2012. http://www.sersc.org/journals/JSE/vol9_no1_2012/11.pdf
6 H. Kim, "The Technology Trend of Forensic mark", Korea Copyright Commission, Sept. 2010. http://www.copyright.or.kr
7 Cheol Jeon, Yookun Cho, "A Robust Steganography-Based Software Watermarking", RACS 2012, San Antonio, TX, USA, 2012. http://dl.acm.org/citation.cfm?id=2401675
8 The Android Open Source Project. Dalvik optimization and verification with dexopt. Available at: http://www.netmite.com/android/mydroid/dalvik/docs/dexopt.html.
9 Security Enginering Research Group, "Analysis of Dalvik Virtual Machine and Class Path Library", 2010. "http://www.academia.edu/4768292/Analysis_of_Dalvik_Virtual_Machine_and_Class_Path_Library_Constrained_Intents_Extending_Android_Security_for_Intent_Policies_EASIP_"
10 Taeyoun Kim, Jihoon Park, Sangyup Kim, WangJae Yi, "Android Anatomy System Service", Developers Happy World, 2011.