메뉴 건너뛰기




Volumn , Issue 1, 2014, Pages 175-186

Achieving accuracy and scalability simultaneously in detecting application clones on Android markets

Author keywords

Android; centroid; clone detection; Software analysis

Indexed keywords

CLONING; CODES (SYMBOLS); COMMERCE; SCALABILITY; SOFTWARE ENGINEERING;

EID: 84994101812     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2568225.2568286     Document Type: Conference Paper
Times cited : (285)

References (54)
  • 4
    • 0039528117 scopus 로고
    • A program for identifying duplicated code
    • B. Baker. A program for identifying duplicated code. Computing Science and Statistics, pages 49-49, 1993.
    • (1993) Computing Science and Statistics , pp. 49
    • Baker, B.1
  • 5
    • 0029222025 scopus 로고
    • On finding duplication and near-duplication in large software systems
    • IEEE 1995
    • B. S. Baker. On finding duplication and near-duplication in large software systems. In Reverse Engineering, 1995., pages 86-95. IEEE, 1995.
    • (1995) Reverse Engineering , pp. 86-95
    • Baker, B.S.1
  • 6
    • 0032311601 scopus 로고    scopus 로고
    • Clone detection using abstract syntax trees
    • I. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In icsm, pages 368-377, 1998.
    • (1998) Icsm , pp. 368-377
    • Baxter, I.1    Yahin, A.2    Moura, L.3    Sant'Anna, M.4    Bier, L.5
  • 9
    • 84865590234 scopus 로고    scopus 로고
    • Attack of the clones: Detecting cloned applications on android markets
    • J. Crussell, C. Gibler, and H. Chen. Attack of the clones: Detecting cloned applications on android markets. Computer Security-ESORICS 2012, pages 37-54, 2012.
    • (2012) Computer Security-ESORICS 2012 , pp. 37-54
    • Crussell, J.1    Gibler, C.2    Chen, H.3
  • 10
    • 84978244413 scopus 로고    scopus 로고
    • Scalable semantics-based detection of similar android applications
    • J. Crussell, C. Gibler, and H. Chen. Scalable semantics-based detection of similar android applications. In ESORICS, 2013.
    • (2013) ESORICS
    • Crussell, J.1    Gibler, C.2    Chen, H.3
  • 11
    • 84994193210 scopus 로고    scopus 로고
    • Dangle Dangle
    • Dangle. Dangle. http: //android. d. cn, 2013.
    • (2013)
  • 14
    • 78650078104 scopus 로고    scopus 로고
    • Scalable and systematic detection of buggy inconsistencies in source code
    • ACM
    • M. Gabel, J. Yang, Y. Yu, M. Goldszmidt, and Z. Su. Scalable and systematic detection of buggy inconsistencies in source code. In ACM Sigplan Notices, volume 45, pages 175-190. ACM, 2010.
    • (2010) ACM Sigplan Notices , vol.45 , pp. 175-190
    • Gabel, M.1    Yang, J.2    Yu, Y.3    Goldszmidt, M.4    Su, Z.5
  • 15
    • 84881131952 scopus 로고    scopus 로고
    • Adrob: Examining the landscape and impact of android application plagiarism
    • C. Gibler, R. Stevens, J. Crussell, H. Chen, H. Zang, and H. Choi. Adrob: Examining the landscape and impact of android application plagiarism. In MobiSys, 2013.
    • (2013) MobiSys
    • Gibler, C.1    Stevens, R.2    Crussell, J.3    Chen, H.4    Zang, H.5    Choi, H.6
  • 16
    • 84880748643 scopus 로고    scopus 로고
    • Google. Google play. https: //play. google. com/store, 2013.
    • (2013) Google Play
  • 18
    • 84976825385 scopus 로고
    • Algorithms for the longest common subsequence problem
    • D. S. Hirschberg. Algorithms for the longest common subsequence problem. Journal of the ACM (JACM), 24 (4): 664-675, 1977.
    • (1977) Journal of the ACM (JACM) , vol.24 , Issue.4 , pp. 664-675
    • Hirschberg, D.S.1
  • 22
    • 0036648690 scopus 로고    scopus 로고
    • Ccfinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto, and K. Inoue. Ccfinder: a multilinguistic token-based code clone detection system for large scale source code. Software Engineering, IEEE Transactions on, 28 (7): 654-670, 2002.
    • (2002) Software Engineering, IEEE Transactions on , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 24
    • 84994068934 scopus 로고    scopus 로고
    • A program plagiarism evaluation system
    • Y.-C. Kim and J. Choi. A program plagiarism evaluation system. ICCSA, pages 221-223, 2005.
    • (2005) ICCSA , pp. 221-223
    • Kim, Y.-C.1    Choi, J.2
  • 25
    • 84890052317 scopus 로고    scopus 로고
    • Using slicing to identify duplication in source code
    • R. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. Static Analysis, pages 40-56, 2001.
    • (2001) Static Analysis , pp. 40-56
    • Komondoor, R.1    Horwitz, S.2
  • 29
    • 33645819206 scopus 로고    scopus 로고
    • Cp-miner: Finding copy-paste and related bugs in large-scale software code
    • Z. Li, S. Lu, S. Myagmar, and Y. Zhou. Cp-miner: Finding copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering, pages 176-192, 2006.
    • (2006) IEEE Transactions on Software Engineering , pp. 176-192
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 30
    • 67649306203 scopus 로고    scopus 로고
    • A method for detecting the theft of Java programs through analysis of the control flow information
    • H.-I. Lim, H. Park, S. Choi, and T. Han. A method for detecting the theft of Java programs through analysis of the control flow information. Information and Software Technology, 51 (9): 1338-1350, 2009.
    • (2009) Information and Software Technology , vol.51 , Issue.9 , pp. 1338-1350
    • Lim, H.-I.1    Park, H.2    Choi, S.3    Han, T.4
  • 31
    • 33749559863 scopus 로고    scopus 로고
    • Gplag: Detection of software plagiarism by program dependence graph analysis
    • C. Liu, C. Chen, J. Han, and P. Yu. Gplag: detection of software plagiarism by program dependence graph analysis. In SIGKDD, pages 872-881, 2006.
    • (2006) SIGKDD , pp. 872-881
    • Liu, C.1    Chen, C.2    Han, J.3    Yu, P.4
  • 33
    • 35048854764 scopus 로고    scopus 로고
    • Detecting software theft via whole program path birthmarks
    • G. Myles and C. Collberg. Detecting software theft via whole program path birthmarks. Information security, pages 404-415, 2004.
    • (2004) Information Security , pp. 404-415
    • Myles, G.1    Collberg, C.2
  • 35
    • 85081771834 scopus 로고    scopus 로고
    • Retargeting android applications to Java bytecode
    • ACM
    • D. Octeau, S. Jha, and P. McDaniel. Retargeting android applications to Java bytecode. In FSE, page 6. ACM, 2012.
    • (2012) FSE , pp. 6
    • Octeau, D.1    Jha, S.2    McDaniel, P.3
  • 36
    • 84994160971 scopus 로고    scopus 로고
    • Opera. Opera software. http: //apps. opera. com, 2013.
    • (2013) Opera Software
  • 49
    • 84994118607 scopus 로고    scopus 로고
    • Wikipedia. Structured programming. http: //en. wikipedia.org/wiki/Structured programming, 2012.
    • (2012) Structured Programming
  • 50
    • 0026185673 scopus 로고    scopus 로고
    • Identifying syntactic differences between two programs
    • W. Yang. Identifying syntactic differences between two programs. Software: Practice and Experience, 21 (7): 739-755, 2006.
    • (2006) Software: Practice and Experience , vol.21 , Issue.7 , pp. 739-755
    • Yang, W.1
  • 52
    • 84874828789 scopus 로고    scopus 로고
    • Fast, scalable detection of piggybacked mobile applications
    • ACM
    • W. Zhou, Y. Zhou, M. Grace, X. Jiang, and S. Zou. Fast, scalable detection of piggybacked mobile applications. In CODASPY, pages 185-196. ACM, 2013.
    • (2013) CODASPY , pp. 185-196
    • Zhou, W.1    Zhou, Y.2    Grace, M.3    Jiang, X.4    Zou, S.5
  • 53
    • 85137132511 scopus 로고    scopus 로고
    • Detecting repackaged smartphone applications in third-party android marketplaces
    • ACM
    • W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications in third-party android marketplaces. In CODASPY, pages 317-326. ACM, 2012.
    • (2012) CODASPY , pp. 317-326
    • Zhou, W.1    Zhou, Y.2    Jiang, X.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.