政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/69198
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 114504/145531 (79%)
造访人次 : 53503022      在线人数 : 765
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/69198


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/69198


    题名: 行動應用軟體在迭代分群行為之研究
    Iterative Clustering on Behaviors of App Executables
    作者: 邱莉晴
    Chiu, Li Ching
    贡献者: 郁方
    Yu, Fang
    邱莉晴
    Chiu, Li Ching
    关键词: 行動應用程式
    GHSOM
    分群
    App
    Clustering
    GHSOM
    iterative
    日期: 2013
    上传时间: 2014-08-25 15:16:54 (UTC+8)
    摘要: 行動裝置在現在這個世代相當普遍,而我們需要一個方法來探索App在背後的行為。
    本研究提出了一個非監督式的分群方式,目的是在於探討我們是否能使用App中的原始碼當作以行為分群的依據。
    在此研究中,我們應用了迭代分群的方式對Apps做分析,並且觀察分群的結果是否恰當。
    而在實驗中,我們由App Store下載了數百個App並加以分析,我們發現我們所提出的方式表現相當良好並且能給出正確的分群結果。
    Smart devices are everywhere nowadays. Mobile application (app) development has become one of the main streams in software industry with more than millions of apps that have been developed and published to billions of users.

    It is essential to have a systematic way to analyze apps, preferably on their executable that are the only public available sources of apps in most cases.

    In this work, we propose to apply unsupervised clustering to mobile applications on their system call distributions. This is done by first adopting a static binary analysis that reverses engineering on executable of apps to find method call/sequence counts that are embedded in apps. Apps are then clustered iteratively based on this information to reveal implicit relationships among apps based on function call similarity. The GHSOM (Growing Hierarchical Self-Organizing Map), an unsupervised learning tool, is integrated to cluster apps based on the information resolved from their executable directly.

    We use types of methods and sequences as features. To run the clustering algorithm on apps, however, we immediately confront a problem that we have a large amount of attributes and data that leads to a long/infeasible analysis time with GHSOMs. The new iterative approach is proposed to conquer this problem along with dimension reduction with principle component analysis, cutting attributes with limited information loss.

    In the preliminary result on analyzing hundreds of apps that are directly downloaded from Apple app store, we can find that the proposed clustering works well and reveals some interesting information. Apps that are developed by the same company are clustered in the same group. Apps that have similar behaviors, e.g., having the same functions on games, painting, socializing, are clustered together.
    參考文獻: [1] Anonymous. (2010) Mimvi Reports Patent Filing for `Intelligent` Mobile App
    Search and Recommendation Technology." Entertainment Close – Up
    [2] Abdi, H., & Williams, L. J. (2010). Principal component analysis. Wiley
    Interdisciplinary Reviews: Computational Statistics, 2(4), 433-459.
    [3] Bizzi, S., Harrison, R. F., & Lerner, D. N. (2009). The Growing Hierarchical
    Self-Organizing Map (GHSOM) for analysing multi-dimensional stream habitat
    datasets. In 18th World IMACS/MODSIM Congress.
    [4] Banković, Z., Stepanović, D., Bojanić, S., & Nieto-Taladriz, O. (2007).
    Improving network security using genetic algorithm approach. Computers &
    Electrical Engineering, 33(5), 438-451.
    [5] Bilar, D. (2007). Opcodes as predictor for malware. International Journal of
    Electronic Security and Digital Forensics, 1(2), 156-168.
    [6] Chang, E. C., Huang, S. C., & Wu, H. H. (2010). Using K-means method and
    spectral clustering technique in an outfitter’s value analysis. Quality & Quantity,
    44(4), 807-815.
    [7] Chandy, R., & Gu, H. (2012, April). Identifying spam in the iOS app store. In
    Proceedings of the 2nd Joint WICOW/AIRWeb Workshop on Web Quality (pp.
    56-59). ACM.
    [8] Danyu X.(2003).Pattern Recognition of Mutual Funds using Self-Organizing
    Maps Order No. MQ88787 Carleton University (Canada)
    [9] Eleyan, A., & Demirel, H. (2006). PCA and LDA based face recognition
    using feedforward neural network classifier. In Multimedia Content
    Representation, Classification and Security (pp. 199-206). Springer Berlin
    Heidelberg.
    [10] Eleyan, A., & Demirel, H. (2007). Pca and lda based neural networks for
    human face recognition. Face Recognition, 93-106.
    [11] Hurlburt, G., Voas, J., & Miller, K. W. (2011). mobile-app addiction: threat
    to security?. IT Professional.
    [12] Hartigan, J. A., & Wong, M. A. (1979). Algorithm AS 136: A k-means
    clustering algorithm. Applied statistics, 100-108.
    [13] Jieun Kim, Yongtae Park, Chulhyun Kim, Hakyeon Lee. "Mobile
    application service networks: Apple’s App Store." Service Business 8.1 (2014):
    1-27.
    [14] Kenney, M., & Pon, B. (2011). Structuring the smartphone industry: is the
    描述: 碩士
    國立政治大學
    資訊管理研究所
    101356040
    102
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G1013560401
    数据类型: thesis
    显示于类别:[資訊管理學系] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    040101.pdf1971KbAdobe PDF2115检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈