You can promote, but you can't hide: large-scale abused app detection in mobile app stores

Z. Xie, Sencun Zhu, Qing Li, Wenjing Wang
{"title":"You can promote, but you can't hide: large-scale abused app detection in mobile app stores","authors":"Z. Xie, Sencun Zhu, Qing Li, Wenjing Wang","doi":"10.1145/2991079.2991099","DOIUrl":null,"url":null,"abstract":"Instead of improving their apps' quality, some developers hire a group of users (called collusive attackers) to post positive ratings and reviews irrespective of the actual app quality. In this work, we aim to expose the apps whose ratings have been manipulated (or abused) by collusive attackers. Specifically, we model the relations of raters and apps as biclique communities and propose four attack signatures to identify malicious communities, where the raters are collusive attackers and the apps are abused apps. We further design a linear-time search algorithm to enumerate such communities in an app store. Our system was implemented and initially run against Apple App Store of China on July 17, 2013. In 33 hours, our system examined 2, 188 apps, with the information of millions of reviews and reviewers downloaded on the fly. It reported 108 abused apps, among which 104 apps were confirmed to be abused. In a later time, we ran our tool against Apple App Stores of China, United Kingdom, and United States in a much larger scale. The evaluation results show that among the apps examined by our tool, abused apps account for 0.94%, 0.92%, and 0.57% out of all the analyzed apps, respectively in June 2013. In our latest checking on Oct. 15, 2015, these ratios decrease to 0.44%, 0.70%, and 0.42%, respectively. Our algorithm can greatly narrow down the suspect list from all apps (e.g., below 1% as shown in our paper). App store vendors may then use other information to do further verification.","PeriodicalId":419419,"journal":{"name":"Proceedings of the 32nd Annual Conference on Computer Security Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 32nd Annual Conference on Computer Security Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2991079.2991099","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15

Abstract

Instead of improving their apps' quality, some developers hire a group of users (called collusive attackers) to post positive ratings and reviews irrespective of the actual app quality. In this work, we aim to expose the apps whose ratings have been manipulated (or abused) by collusive attackers. Specifically, we model the relations of raters and apps as biclique communities and propose four attack signatures to identify malicious communities, where the raters are collusive attackers and the apps are abused apps. We further design a linear-time search algorithm to enumerate such communities in an app store. Our system was implemented and initially run against Apple App Store of China on July 17, 2013. In 33 hours, our system examined 2, 188 apps, with the information of millions of reviews and reviewers downloaded on the fly. It reported 108 abused apps, among which 104 apps were confirmed to be abused. In a later time, we ran our tool against Apple App Stores of China, United Kingdom, and United States in a much larger scale. The evaluation results show that among the apps examined by our tool, abused apps account for 0.94%, 0.92%, and 0.57% out of all the analyzed apps, respectively in June 2013. In our latest checking on Oct. 15, 2015, these ratios decrease to 0.44%, 0.70%, and 0.42%, respectively. Our algorithm can greatly narrow down the suspect list from all apps (e.g., below 1% as shown in our paper). App store vendors may then use other information to do further verification.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
你可以推广,但你不能隐藏:手机应用商店中大规模滥用应用检测
有些开发者并没有提高应用的质量,而是雇佣了一群用户(游戏邦注:即所谓的“串通攻击者”)来发布积极的评级和评论,而不管应用的实际质量如何。在这项工作中,我们的目标是揭露那些评级被串通攻击者操纵(或滥用)的应用程序。具体来说,我们将评分者和应用程序之间的关系建模为自行车社区,并提出了四个攻击签名来识别恶意社区,其中评分者是串通攻击者,应用程序是被滥用的应用程序。我们进一步设计了一个线性时间搜索算法来枚举应用商店中的此类社区。我们的系统于2013年7月17日在苹果中国应用商店上线并初步运行。在33个小时内,我们的系统检查了2188个应用程序,其中包含数百万条评论和即时下载的评论者的信息。它报告了108个被滥用的应用程序,其中104个应用程序被确认被滥用。后来,我们又在中国、英国和美国的苹果应用商店中更大规模地运行了我们的工具。评估结果显示,在我们的工具检查的应用中,滥用应用在2013年6月分别占所有分析应用的0.94%,0.92%和0.57%。在我们2015年10月15日的最新检查中,这些比率分别下降到0.44%,0.70%和0.42%。我们的算法可以大大缩小所有应用程序的可疑列表(例如,在我们的论文中显示,低于1%)。然后,应用商店供应商可能会使用其他信息进行进一步验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
ShieldFS: a self-healing, ransomware-aware filesystem CoKey: fast token-based cooperative cryptography Proceedings of the 32nd Annual Conference on Computer Security Applications Reliably determining data leakage in the presence of strong attackers Code obfuscation against symbolic execution attacks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1