2013 Proceedings IEEE INFOCOM 2013
DOI: 10.1109/infcom.2013.6566868
|View full text |Cite
|
Sign up to set email alerts
|

NetworkProfiler: Towards automatic fingerprinting of Android apps

Abstract: Network operators need to have a clear visibility into the applications running in their network. This is critical for both security and network management. Recent years have seen an exponential growth in the number of smart phone apps which has complicated this task. Traditional methods of traffic classification are no longer sufficient as the majority of this smart phone app traffic is carried over HTTP/HTTPS. Keeping up with the new applications that come up everyday is very challenging and time-consuming. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
90
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 146 publications
(93 citation statements)
references
References 12 publications
0
90
0
Order By: Relevance
“…We have developed a system for analyzing Android apps that installs and runs each Android app in a separate emulator running in a virtual machine [13]. Here we describe the parts of the system relevant for collecting ad flows.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We have developed a system for analyzing Android apps that installs and runs each Android app in a separate emulator running in a virtual machine [13]. Here we describe the parts of the system relevant for collecting ad flows.…”
Section: Methodsmentioning
confidence: 99%
“…A limitation of this technique is that some of the ad networks require developer identifiers which can be shared by different apps from the same developer. We have observed that queries from many apps have certain unique patterns (such as certain key-value parameters in the URL query) that can be used to identify them [13]. In the future we plan to analyze patterns in the URL queries in ad flows to form fingerprints that can be used to correctly attribute the flow to the originating app.…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…Previous approaches to automatic profiling Android applications have been targeting just a specific game [8], or just a specific aspect of games, like the game energy states [7], game network connections [11], game security [9] or privacy, i.e., access to user sensitive data by games [10]. A number of works test generic Android applications, without specifically targeting games, but they either relay on completely random input generation [14], application-specific input generation [15], a properly tuned mix of random input and input paths generated from a given application-specific seed [11], or a prior knowledge of all the interactive elements present in each game state [12].…”
Section: Introductionmentioning
confidence: 99%
“…A number of works test generic Android applications, without specifically targeting games, but they either relay on completely random input generation [14], application-specific input generation [15], a properly tuned mix of random input and input paths generated from a given application-specific seed [11], or a prior knowledge of all the interactive elements present in each game state [12]. Finally, there are approaches to test generic Android applications from a holistic point of view, but using human players instead of automated input [13].…”
Section: Introductionmentioning
confidence: 99%
“…Similar migration is handled across multiple devices used by the same individual. A stand-alone module, interacting with the MAPPER system through a specific net app, handles mobile application identification and categorization [3]- [5]. Furthermore, by executing a man-in-the-middle proxy module [6], MAPPER also provides visibility into encrypted application traffic.…”
Section: Introductionmentioning
confidence: 99%