@article{oai:miyazaki-u.repo.nii.ac.jp:00006230, author = {藤, 竜成 and Fuji, Ryusei and 五味, 健一郎 and Aburada, Kentaro and 油田, 健太郎 and Yamaba, Hisaaki and 山場, 久昭 and Okazaki, Naonobu and 岡崎, 直宣 and 藤, 竜成 and Fuji, Ryusei and Gomi, Ken’ichiro}, journal = {宮崎大学工学部紀要, Memoirs of Faculty of Engineering, University of Miyazaki}, month = {Sep}, note = {Since Android is widely used as an operating system (OS) for smartphones, applications running on the OS are being targeted by malware developers. Android applications are generally created using Java, which means it is easy to decompile the application and add or change the code; therefore, malware developers can easily insert malware and illegal advertisements into legitimate applications. The modified applications are called repackaged applications. These applications are uploaded to a market for users to install, however since repackaged applications have a negative effect on users, their detection and removal are important. The Developers of repackaged applications tend to be reluctant to make large changes to data, called application metadata, to make users misrecognition. To detect repackaged applications, “CloneSpot” has been proposed which uses the above trends, however, improvements are required for efficient detection. In this study, we propose an improved method of “CloneSpot” for the efficient detection of repackaged applications. Specifically, we improve the clustering of “CloneSpot” and introduce evaluation indexes for efficient repackaged application detection. In the evaluation experiments, we evaluated the clustering accuracy and the repackaged application estimation accuracy of the proposed method.}, pages = {165--169}, title = {メタデータを用いたリパッケージアプリの検出手法「CloneSpot」の改良}, volume = {49}, year = {2020}, yomi = {フジ, リュウセイ and アブラダ, ケンタロウ and ヤマバ, ヒサアキ and オカザキ, ナオノブ and フジ, リュウセイ} }