skip to main content
10.1145/2591971.2592003acmconferencesArticle/Chapter ViewAbstractPublication PagesmetricsConference Proceedingsconference-collections
research-article

A measurement study of google play

Published:16 June 2014Publication History

ABSTRACT

Although millions of users download and use third-party Android applications from the Google Play store, little information is known on an aggregated level about these applications. We have built PlayDrone, the first scalable Google Play store crawler, and used it to index and analyze over 1,100,000 applications in the Google Play store on a daily basis, the largest such index of Android applications. PlayDrone leverages various hacking techniques to circumvent Google's roadblocks for indexing Google Play store content, and makes proprietary application sources available, including source code for over 880,000 free applications. We demonstrate the usefulness of PlayDrone in decompiling and analyzing application content by exploring four previously unaddressed issues: the characterization of Google Play application content at large scale and its evolution over time, library usage in applications and its impact on application portability, duplicative application content in Google Play, and the ineffectiveness of OAuth and related service authentication mechanisms resulting in malicious users being able to easily gain unauthorized access to user data and resources on Amazon Web Services and Facebook.

References

  1. Amazon Web Services. IAM Best Practices, May 2010. http://docs.aws.amazon.com/IAM/latest/UserGuide/IAMBestPractices.html.Google ScholarGoogle Scholar
  2. Amazon Web Services. Creating Temporary Security Credentials for Mobile Apps Using Identity Providers. AWS Security Token Service, June 2011. http://docs. aws.amazon.com/STS/latest/UsingSTS/CreatingWIF.html.Google ScholarGoogle Scholar
  3. Amazon Web Services. Authenticating Users of AWS Mobile Applications with a Token Vending Machine. AWS Identity and Access Management, July 2013. http://aws.amazon.com/articles/4611615499399490.Google ScholarGoogle Scholar
  4. Amazon Web Services. Getting Started with the AWS SDK for Android. AWS SDK for Android, Sept. 2013. http://docs.aws.amazon.com/mobile/sdkforandroid/gsg/Welcome.html.Google ScholarGoogle Scholar
  5. AndroLib. http://www.androlib.com.Google ScholarGoogle Scholar
  6. AppBrain. http://www.appbrain.com.Google ScholarGoogle Scholar
  7. R. Bala. Amazon Is Downloading Apps From Google Play and Inspecting Them. Y Combinator Hacker News, Mar. 2014. https://news.ycombinator.com/item?id=7491272.Google ScholarGoogle Scholar
  8. Capistrano. http://capistranorb.com.Google ScholarGoogle Scholar
  9. Chef. http://www.getchef.com.Google ScholarGoogle Scholar
  10. R. Chirgwin. Amazon Is Decompiling Our Apps in Security Gaff Hunt, Says Dev. The Register, Mar. 2014. http://www.theregister.co.uk/2014/03/31/dev_lashes_out_at_amazon_for_decompiling_his_app.Google ScholarGoogle Scholar
  11. B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. CloneCloud: Elastic Execution Between Mobile Device and Cloud. In Proceedings of the 6th European Conference on Computer systems (EuroSys 2011), Apr. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Crussell, C. Gibler, and H. Chen. Attack of the Clones: Detecting Cloned Applications on Android Markets. In Proceedings of 17th European Symposium on Research in Computer Security (ESORICS 2012), Sept. 2012.Google ScholarGoogle ScholarCross RefCross Ref
  13. J. Crussell, C. Gibler, and H. Chen. AnDarwin: Scalable Detection of Semantically Similar Android Applications. In Proceedings of 18th European Symposium on Research in Computer Security (ESORICS 2013), Sept. 2013.Google ScholarGoogle ScholarCross RefCross Ref
  14. Death by Captcha. http://www.deathbycaptcha.com.Google ScholarGoogle Scholar
  15. A. Desnos. Androguard. https://code.google.com/p/androguard.Google ScholarGoogle Scholar
  16. dex2jar. http://code.google.com/p/dex2jar.Google ScholarGoogle Scholar
  17. N. d'Heureuse, F. Huici, M. Arumaithurai, M. Ahmed, K. Papagiannaki, and S. Niccolini. What's App?: A Wide-Scale Measurement Study of Smart Phone Markets. Mobile Computing and Communications Review, 16(2):16--27, Apr. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Elasticsearch. http://www.elasticsearch.org.Google ScholarGoogle Scholar
  19. W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A Study of Android Application Security. In Proceedings of the 20th USENIX Security Symposium, Aug. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Facebook. Login Security. https://developers.facebook.com/docs/facebook-login/security.Google ScholarGoogle Scholar
  21. A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A Survey of Mobile Malware in the Wild. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011), July 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Gibler, R. Stevens, J. Crussell, H. Chen, H. Zang, and H. Choi. AdRob: Examining the Landscape and Impact of Android Application Plagiarism. In Proceedings of the 11th International Conference on Mobile Systems, Applications, and Services (MobiSys 2013), June 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. E. Girault. Google Play Unofficial Python API. https://github.com/egirault/googleplay-api.Google ScholarGoogle Scholar
  24. M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. RiskRanker: Scalable and Accurate Zero-day Android Malware Detection. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys 2012), June 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. B. Gruver. smali/baksmali assembler/disassembler. https://code.google.com/p/smali.Google ScholarGoogle Scholar
  26. S. Hanna, L. Huang, E. X. Wu, S. Li, C. Chen, and D. Song. Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications. In Proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2012), July 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. M. Kotadia. AWS Admits Scanning Android App in Secret Key Hunt. iTnews, Apr. 2014. http://www.itnews.com.au/News/381432, aws-admits-scanning-android-app-in-secret-key-hunt. aspx.Google ScholarGoogle Scholar
  28. MixRank. http://www.mixrank.com.Google ScholarGoogle Scholar
  29. R. Mogull. My $500 Cloud Security Screwup-UPDATED. Securosis Blog, Jan. 2014. https://securosis.com/blog/my-500-cloud-security-screwup.Google ScholarGoogle Scholar
  30. M. Perham. Sidekiq. http://sidekiq.org.Google ScholarGoogle Scholar
  31. C. K. Roy, J. R. Cordy, and R. Koschke. Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach. Sci. Comput. Program., 74(7):470--495, May 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. S. Sanflippo. Redis. http://redis.io.Google ScholarGoogle Scholar
  33. A. Thiel. Android-market-api. https://code.google.com/p/android-market-api.Google ScholarGoogle Scholar
  34. C. Tumbleson. Android-apktool. http://code.google.com/p/android-apktool.Google ScholarGoogle Scholar
  35. Twitter. Implementing the Twitter OAuth flow in Android. https://dev.twitter.com/docs/implementing-twitter-oauth-flow-android.Google ScholarGoogle Scholar
  36. N. Viennot. Java Library for JD-Core. https://github.com/nviennot/jd-core-java.Google ScholarGoogle Scholar
  37. N. Viennot. PlayDrone sources. https://github.com/nviennot/google-play-crawler.Google ScholarGoogle Scholar
  38. C. Warren. Google Play Hits 1 Million Apps. Mashable, July 2013. http://mashable.com/2013/07/24/google-play-1-million.Google ScholarGoogle Scholar
  39. Y. Zhang, G. Huang, X. Liu, W. Zhang, H. Mei, and S. Yang. Refactoring Android Java Code for On-Demand Computation Offloading. In Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2012), Oct. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. W. Zhou, Y. Zhou, M. C. Grace, X. Jiang, and S. Zou. Fast, Scalable Detection of "Piggybacked" Mobile Applications. In Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY 2013), Feb. 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting Repackaged Smartphone Applications in Third-party Android Marketplaces. In Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy (CODASPY 2012), Feb. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Y. Zhou and X. Jiang. Dissecting Android Malware: Characterization and Evolution. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP 12), May 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS 2012), Feb. 2012.Google ScholarGoogle Scholar

Index Terms

  1. A measurement study of google play

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SIGMETRICS '14: The 2014 ACM international conference on Measurement and modeling of computer systems
            June 2014
            614 pages
            ISBN:9781450327893
            DOI:10.1145/2591971

            Copyright © 2014 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 16 June 2014

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            SIGMETRICS '14 Paper Acceptance Rate40of237submissions,17%Overall Acceptance Rate459of2,691submissions,17%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader