Comparing Android Applications to Find Copying

The Android smartphone operating system includes a Java mobile development platform that provides for rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concern...

Full description

Bibliographic Details
Main Authors: Larry Melling, Bob Zeidman
Format: Article
Language:English
Published: Association of Digital Forensics, Security and Law 2012-03-01
Series:Journal of Digital Forensics, Security and Law
Online Access:http://ojs.jdfsl.org/index.php/jdfsl/article/view/67
id doaj-5f849ccf3bc744e8a2ca99ee290d3e54
record_format Article
spelling doaj-5f849ccf3bc744e8a2ca99ee290d3e542020-11-25T02:50:05ZengAssociation of Digital Forensics, Security and LawJournal of Digital Forensics, Security and Law1558-72151558-72232012-03-0171557016Comparing Android Applications to Find CopyingLarry Melling0Bob Zeidman1Zeidman ConsultingZeidman ConsultingThe Android smartphone operating system includes a Java mobile development platform that provides for rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer’s application with a downloaded application and defines an identifiability metric to quantify the degree to which an application can be identified by its bytecode.http://ojs.jdfsl.org/index.php/jdfsl/article/view/67
collection DOAJ
language English
format Article
sources DOAJ
author Larry Melling
Bob Zeidman
spellingShingle Larry Melling
Bob Zeidman
Comparing Android Applications to Find Copying
Journal of Digital Forensics, Security and Law
author_facet Larry Melling
Bob Zeidman
author_sort Larry Melling
title Comparing Android Applications to Find Copying
title_short Comparing Android Applications to Find Copying
title_full Comparing Android Applications to Find Copying
title_fullStr Comparing Android Applications to Find Copying
title_full_unstemmed Comparing Android Applications to Find Copying
title_sort comparing android applications to find copying
publisher Association of Digital Forensics, Security and Law
series Journal of Digital Forensics, Security and Law
issn 1558-7215
1558-7223
publishDate 2012-03-01
description The Android smartphone operating system includes a Java mobile development platform that provides for rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer’s application with a downloaded application and defines an identifiability metric to quantify the degree to which an application can be identified by its bytecode.
url http://ojs.jdfsl.org/index.php/jdfsl/article/view/67
work_keys_str_mv AT larrymelling comparingandroidapplicationstofindcopying
AT bobzeidman comparingandroidapplicationstofindcopying
_version_ 1724740316217475072