skip to main content
10.1145/3121264.3121267acmconferencesArticle/Chapter ViewAbstractPublication PagesfseConference Proceedingsconference-collections
research-article

Understanding the security management of global third-party Android marketplaces

Published:05 September 2017Publication History

ABSTRACT

As an open platform, Android enables the introduction of a variety of third-party marketplaces in which developers can provide mo- bile apps that are not provided in the official marketplace. Since the initial release of Android OS in 2008, many third-party app marketplaces have been launched all over the world. e diversity of which leads us to the following research question: are these third- party marketplaces securely managed? is work aims to answer this question through a large-scale empirical study. We collected more than 4.7 million Android apps from 27 third-party market- places, including ones that had not previously been studied in the research community, and analyzed them to study their security measures. Based on the results, we also a empt to quantify the security index of these marketplaces.

References

  1. Adding licensing to your app | android developers. https://developer.android. com/google/play/licensing/adding-licensing.html.Google ScholarGoogle Scholar
  2. Alexa - actionable analytics for the web. http://www.alexa.com/.Google ScholarGoogle Scholar
  3. Android operating system statistics - appbrain. http://www.appbrain.com/stats/.Google ScholarGoogle Scholar
  4. apktool. https://code.google.com/p/android-apktool/.Google ScholarGoogle Scholar
  5. F-Secure: Android accounted for 97% of all mobile malware in 2013, but only 0.1% of those were on Google Play. http://thenextweb.com/google/2014/03/04/fsecure-android-accounted-97-mobile-malware-2013-0-1-google-play/.Google ScholarGoogle Scholar
  6. Fake apps: Feigning legitimacy. http://www.trendmicro.com/cloud-content/us/ pdfs/security-intelligence/white-papers/wp-fake-apps.pdf.Google ScholarGoogle Scholar
  7. jadx. https://github.com/skylot/jadx.Google ScholarGoogle Scholar
  8. smali. https://code.google.com/p/smali/.Google ScholarGoogle Scholar
  9. Supported locations for distribution to google play users. https://support.google. com/googleplay/android-developer/table/3541286.Google ScholarGoogle Scholar
  10. Virustotal. https://www.virustotal.com/.Google ScholarGoogle Scholar
  11. K. Allix, T. F. Bissyandé, J. Klein, and Y. Le Traon. Androzoo: collecting millions of android apps for the research community. In Proceedings of the 13th International Workshop on Mining Software Repositories, pages 468–471. ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Y. Ishii, T. Watanabe, M. Akiyama, and T. Mori. Clone or relative?: Understanding the origins of similar android apps. In Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, pages 25–32. ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Lindorfer, S. Volanis, A. Sisto, M. Neugschwandtner, E. Athanasopoulos, F. Maggi, C. Platzer, S. Zanero, and S. Ioannidis. Andradar: fast discovery of android applications in alternative markets. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pages 51–71. Springer, 2014. Google ScholarGoogle ScholarCross RefCross Ref
  14. Y. Shao, X. Luo, C. Qian, P. Zhu, and L. Zhang. Towards a scalable resource-driven approach for detecting repackaged android applications. In Proceedings of the 30th Annual Computer Security Applications Conference, pages 56–65. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. T. Vidas and N. Christin. Sweetening android lemon markets: measuring and combating malware in application marketplaces. In Proceedings of the third ACM conference on Data and application security and privacy, pages 197–208. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. N. Viennot, E. Garcia, and J. Nieh. A measurement study of google play. Proc. of ACM SIGMETRICS 2014, June 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Watanabe, M. Akiyama, F. Kanei, E. Shioji, Y. Takata, B. Sun, Y. Ishii, T. Shibahara, T. Yagi, and T. Mori. Understanding the Origins of Mobile App Vulnerabilities: A Large-scale Measurement Study of Free and Paid Apps. In Proceedings of IEEE/ACM 14th International Conference on Mining Software Repositories (MSR 2017), July 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Zhauniarovich, Yury, Gadyatskaya, Olga, Crispo, Bruno, L. Spina, Francesco, Moser, and Ermanno. Fsquadra: Fast detection of repackaged applications. Proc. of IFIP DBSec ’14, pages 131–146, 2014.Google ScholarGoogle Scholar
  19. W. Zhou, Y. Zhou, M. Grace, X. Jiang, and S. Zou. Fast, scalable detection of "piggybacked" mobile applications. In Proc. of the third ACM CODASPY 2013, pages 185–196.Google ScholarGoogle Scholar
  20. W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications in third-party android marketplaces. In Proc. of the second ACM CODASPY 2012, pages 317–326. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In 2012 IEEE Symposium on Security and Privacy, pages 95–109. IEEE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Understanding the security management of global third-party Android marketplaces

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WAMA 2017: Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics
      September 2017
      25 pages
      ISBN:9781450351584
      DOI:10.1145/3121264

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 September 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader