Please use this identifier to cite or link to this item:
http://localhost:8081/jspui/handle/123456789/17627
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Singh, Ankush Kumar | - |
dc.date.accessioned | 2025-07-03T13:09:37Z | - |
dc.date.available | 2025-07-03T13:09:37Z | - |
dc.date.issued | 2013-06 | - |
dc.identifier.uri | http://localhost:8081/jspui/handle/123456789/17627 | - |
dc.description.abstract | We are living in the post-PC era, where smartphones, tablets and other mobile devices have grabbed the market. These mobile devices accompany huge number of useful and feature-rich applications. Mobile devices contain more sensitive information than computer systems like GPS location, contact list, owner's credential etc. Besides this mobile devices are capable of voice calling, messaging, internet connectivity etc. Apps optimize the usage of these devices. We have apps to entertain, connect with our friends, search and browse anything on the move. This attracts apps repackagers to exploit the mobile features and information contained in these devices and apps are the way to accomplish this. In this paper, we have given a systematic procedure to check whether a given app is repackaged or not. For this we have used context trigger piecewise hashing and edit distance measurements. Our prototype not only reveals whether the app is repackaged or not but also pinpoints the modified segments. Once the modified segments are recognized, Jaccard coefficient is calculated to find the similar segments. Then reverse engineering is performed only on these obtained similar segments not on the entire app. This reduces the time and efforts and improves the efficiency of reverse engineering | en_US |
dc.description.sponsorship | INDIAN INSTITUTE OF TECHNOLOGY ROORKEE | en_US |
dc.language.iso | en | en_US |
dc.publisher | I I T ROORKEE | en_US |
dc.subject | Computer Systems | en_US |
dc.subject | Mobile Devices | en_US |
dc.subject | Information Contained | en_US |
dc.subject | Mobile Features | en_US |
dc.title | SYSTEM FOR DETECTING CODE REUSE AMONG ANDROID APPLICATIONS | en_US |
dc.type | Other | en_US |
Appears in Collections: | MASTERS' THESES (E & C) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
G22859.pdf | 5.65 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.