Abstract:
TPL detection is crucial to Android malware analysis. Recent research emphasizes signature-based methods. Previous methods have limitations like high time complexity and low precision, especially with similar TPLs and different TPL versions.
LibRoad, a signature-based TPL detection method, addresses these issues. Our method uses application preprocessing and pairwise package matching to save time. The former divides an application into primary and non-primary modules so we can analyze packages in non-primary modules that are most likely imported from TPLs.
The latter uses the package name-based matching policy for non-obfuscated packages and the signature-based matching policy for obfuscated packages. The former has a lower time complexity than the latter.
Our approach also uses a perfectly matched package and TPL determination component to identify TPLs with low false positive and false negative rates. We test several real-world applications and two ground truth bases. Experimental results show that LibRoad can achieve 99.86 percent recall and 11.48 percent false positive rate without sacrificing efficiency.
Note: Please discuss with our team before submitting this abstract to the college. This Abstract or Synopsis varies based on student project requirements.
Did you like this final year project?
To download this project Code with thesis report and project training... Click Here