2019
DOI: 10.1007/s10664-019-09760-3
|View full text |Cite
|
Sign up to set email alerts
|

Empirical study of android repackaged applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 57 publications
0
7
0
Order By: Relevance
“…Thus, a package name on Google Play might be used by a different app on another store (e.g., a Chinese store). In fact, prior research showed that apps sharing package names could be repackaged and thus may have no relation to the original developer [73]. Further, in the case of pre-installed browsers, any manufacturer can modify and pre-install any open-source browser app with the default package name, i.e., com.android.browser [51].…”
Section: Identifying Unique Browsersmentioning
confidence: 99%
“…Thus, a package name on Google Play might be used by a different app on another store (e.g., a Chinese store). In fact, prior research showed that apps sharing package names could be repackaged and thus may have no relation to the original developer [73]. Further, in the case of pre-installed browsers, any manufacturer can modify and pre-install any open-source browser app with the default package name, i.e., com.android.browser [51].…”
Section: Identifying Unique Browsersmentioning
confidence: 99%
“…Application repackaging is one of the most vulnerable issues in Android/iOS applications. The authors in [5] presented work on repackaged applications. They addressed five issues, namely (1) the current unfavorable repackaging practices, (2) the way adware is embedded in the code, (3) the types of apps used to repackage, (4) the reasons people download repackaged software, and (5) the way the properties of an app change in the repackaged version.…”
Section: Related Workmentioning
confidence: 99%
“…With the rising number of users, the number of threats and exploitations are also rising. According to the authors of the work [5], malware developers inject code into the service component that runs in the hidden layer without the concern of the user. The first Android Malware included DroidSMS, which targeted SMS services, and TapSnake, which transmitted GPS locations.…”
Section: Android System Architecture and Attacksmentioning
confidence: 99%
“…That also depended on installing a specific unverified APK or has not an illegal certificate. Sometimes, these programs carry out the suspicious activities including spying on information and spreading harmful codes, breaking passwords, and injecting backdoor [11][12][13].…”
Section: General Overviewmentioning
confidence: 99%