AyatDroid: a lightweight code cloning technique using different static features

buir.contributor.authorShah, Syed Asad
dc.citation.epage21en_US
dc.citation.spage17
dc.contributor.authorGlani, Y.
dc.contributor.authorPing, L.
dc.contributor.authorLin, K.
dc.contributor.authorShah, Syed Asad
dc.coverage.spatialXiamen, China
dc.date.accessioned2024-03-19T13:04:14Z
dc.date.available2024-03-19T13:04:14Z
dc.date.issued2023-08-23
dc.departmentDepartment of Computer Engineering
dc.descriptionDate of Conference: 16-18 June 2023
dc.descriptionConference Name: 3rd IEEE International Conference on Software Engineering and Artificial Intelligence, SEAI 2023
dc.description.abstractIn recent decades, malicious code reuse has surged in numbers and sophistication, it is a common practice among adversaries to reuse malicious code, which significantly threatens user privacy and security. Several signature-based code clone detection techniques have been proposed to detect malicious clones in Android applications that use the MD5 hash function to generate signatures. Meanwhile, these techniques only retrieve signatures from Java files. Due to the 128-bit signature size of the MD5 hash function, these techniques take longer to generate signatures. In this article, we propose the AyatDroid technique, which efficiently identifies malicious chunks by retrieving signatures from Java and manifest files. AyatDroid technique is tested on reliable CiCMalDroid 2020 dataset. We have evaluated the AyatDroid technique with other cutting-edge code clone detection techniques. Our experimental results demonstrated that AyatDroid outperformed regarding detection time and accuracy. AyatDroid is not only lightweight but also efficient, allowing it to be implemented on the large scale.
dc.description.provenanceMade available in DSpace on 2024-03-19T13:04:14Z (GMT). No. of bitstreams: 1 AyatDroid_a_lightweight_code_cloning_technique_using_different_static_features.pdf: 1202505 bytes, checksum: bb54c52f94ecef3632a00f0c1f417495 (MD5) Previous issue date: 2023-08en
dc.identifier.doi10.1109/SEAI59139.2023.10217577en_US
dc.identifier.eisbn9798350337952en_US
dc.identifier.isbn9798350337969en_US
dc.identifier.urihttps://hdl.handle.net/11693/114986en_US
dc.language.isoEnglishen_US
dc.publisherIEEE - Institute of Electrical and Electronics Engineersen_US
dc.relation.isversionofhttps://dx.doi.org/10.1109/SEAI59139.2023.10217577
dc.source.title2023 IEEE 3rd International Conference on Software Engineering and Artificial Intelligence (SEAI 2023)
dc.subjectCode cloning
dc.subjectSoftware reuse
dc.subjectMalicious code detection
dc.subjectAndroid applications
dc.subjectKeyword extraction
dc.titleAyatDroid: a lightweight code cloning technique using different static features
dc.typeConference Paper

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
AyatDroid_a_lightweight_code_cloning_technique_using_different_static_features.pdf
Size:
1.15 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.01 KB
Format:
Item-specific license agreed upon to submission
Description: