Comparing Android Applications to Find Copying
The Android smartphone operating system includes a Java mobile development platform that provides for rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concern...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Association of Digital Forensics, Security and Law
2012-03-01
|
Series: | Journal of Digital Forensics, Security and Law |
Online Access: | http://ojs.jdfsl.org/index.php/jdfsl/article/view/67 |
id |
doaj-5f849ccf3bc744e8a2ca99ee290d3e54 |
---|---|
record_format |
Article |
spelling |
doaj-5f849ccf3bc744e8a2ca99ee290d3e542020-11-25T02:50:05ZengAssociation of Digital Forensics, Security and LawJournal of Digital Forensics, Security and Law1558-72151558-72232012-03-0171557016Comparing Android Applications to Find CopyingLarry Melling0Bob Zeidman1Zeidman ConsultingZeidman ConsultingThe Android smartphone operating system includes a Java mobile development platform that provides for rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer’s application with a downloaded application and defines an identifiability metric to quantify the degree to which an application can be identified by its bytecode.http://ojs.jdfsl.org/index.php/jdfsl/article/view/67 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Larry Melling Bob Zeidman |
spellingShingle |
Larry Melling Bob Zeidman Comparing Android Applications to Find Copying Journal of Digital Forensics, Security and Law |
author_facet |
Larry Melling Bob Zeidman |
author_sort |
Larry Melling |
title |
Comparing Android Applications to Find Copying |
title_short |
Comparing Android Applications to Find Copying |
title_full |
Comparing Android Applications to Find Copying |
title_fullStr |
Comparing Android Applications to Find Copying |
title_full_unstemmed |
Comparing Android Applications to Find Copying |
title_sort |
comparing android applications to find copying |
publisher |
Association of Digital Forensics, Security and Law |
series |
Journal of Digital Forensics, Security and Law |
issn |
1558-7215 1558-7223 |
publishDate |
2012-03-01 |
description |
The Android smartphone operating system includes a Java mobile development platform that provides for rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer’s application with a downloaded application and defines an identifiability metric to quantify the degree to which an application can be identified by its bytecode. |
url |
http://ojs.jdfsl.org/index.php/jdfsl/article/view/67 |
work_keys_str_mv |
AT larrymelling comparingandroidapplicationstofindcopying AT bobzeidman comparingandroidapplicationstofindcopying |
_version_ |
1724740316217475072 |