English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113822/144841 (79%)
Visitors : 51795574      Online Users : 466
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/69198
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/69198


    Title: 行動應用軟體在迭代分群行為之研究
    Iterative Clustering on Behaviors of App Executables
    Authors: 邱莉晴
    Chiu, Li Ching
    Contributors: 郁方
    Yu, Fang
    邱莉晴
    Chiu, Li Ching
    Keywords: 行動應用程式
    GHSOM
    分群
    App
    Clustering
    GHSOM
    iterative
    Date: 2013
    Issue Date: 2014-08-25 15:16:54 (UTC+8)
    Abstract: 行動裝置在現在這個世代相當普遍,而我們需要一個方法來探索App在背後的行為。
    本研究提出了一個非監督式的分群方式,目的是在於探討我們是否能使用App中的原始碼當作以行為分群的依據。
    在此研究中,我們應用了迭代分群的方式對Apps做分析,並且觀察分群的結果是否恰當。
    而在實驗中,我們由App Store下載了數百個App並加以分析,我們發現我們所提出的方式表現相當良好並且能給出正確的分群結果。
    Smart devices are everywhere nowadays. Mobile application (app) development has become one of the main streams in software industry with more than millions of apps that have been developed and published to billions of users.

    It is essential to have a systematic way to analyze apps, preferably on their executable that are the only public available sources of apps in most cases.

    In this work, we propose to apply unsupervised clustering to mobile applications on their system call distributions. This is done by first adopting a static binary analysis that reverses engineering on executable of apps to find method call/sequence counts that are embedded in apps. Apps are then clustered iteratively based on this information to reveal implicit relationships among apps based on function call similarity. The GHSOM (Growing Hierarchical Self-Organizing Map), an unsupervised learning tool, is integrated to cluster apps based on the information resolved from their executable directly.

    We use types of methods and sequences as features. To run the clustering algorithm on apps, however, we immediately confront a problem that we have a large amount of attributes and data that leads to a long/infeasible analysis time with GHSOMs. The new iterative approach is proposed to conquer this problem along with dimension reduction with principle component analysis, cutting attributes with limited information loss.

    In the preliminary result on analyzing hundreds of apps that are directly downloaded from Apple app store, we can find that the proposed clustering works well and reveals some interesting information. Apps that are developed by the same company are clustered in the same group. Apps that have similar behaviors, e.g., having the same functions on games, painting, socializing, are clustered together.
    Reference: [1] Anonymous. (2010) Mimvi Reports Patent Filing for `Intelligent` Mobile App
    Search and Recommendation Technology." Entertainment Close – Up
    [2] Abdi, H., & Williams, L. J. (2010). Principal component analysis. Wiley
    Interdisciplinary Reviews: Computational Statistics, 2(4), 433-459.
    [3] Bizzi, S., Harrison, R. F., & Lerner, D. N. (2009). The Growing Hierarchical
    Self-Organizing Map (GHSOM) for analysing multi-dimensional stream habitat
    datasets. In 18th World IMACS/MODSIM Congress.
    [4] Banković, Z., Stepanović, D., Bojanić, S., & Nieto-Taladriz, O. (2007).
    Improving network security using genetic algorithm approach. Computers &
    Electrical Engineering, 33(5), 438-451.
    [5] Bilar, D. (2007). Opcodes as predictor for malware. International Journal of
    Electronic Security and Digital Forensics, 1(2), 156-168.
    [6] Chang, E. C., Huang, S. C., & Wu, H. H. (2010). Using K-means method and
    spectral clustering technique in an outfitter’s value analysis. Quality & Quantity,
    44(4), 807-815.
    [7] Chandy, R., & Gu, H. (2012, April). Identifying spam in the iOS app store. In
    Proceedings of the 2nd Joint WICOW/AIRWeb Workshop on Web Quality (pp.
    56-59). ACM.
    [8] Danyu X.(2003).Pattern Recognition of Mutual Funds using Self-Organizing
    Maps Order No. MQ88787 Carleton University (Canada)
    [9] Eleyan, A., & Demirel, H. (2006). PCA and LDA based face recognition
    using feedforward neural network classifier. In Multimedia Content
    Representation, Classification and Security (pp. 199-206). Springer Berlin
    Heidelberg.
    [10] Eleyan, A., & Demirel, H. (2007). Pca and lda based neural networks for
    human face recognition. Face Recognition, 93-106.
    [11] Hurlburt, G., Voas, J., & Miller, K. W. (2011). mobile-app addiction: threat
    to security?. IT Professional.
    [12] Hartigan, J. A., & Wong, M. A. (1979). Algorithm AS 136: A k-means
    clustering algorithm. Applied statistics, 100-108.
    [13] Jieun Kim, Yongtae Park, Chulhyun Kim, Hakyeon Lee. "Mobile
    application service networks: Apple’s App Store." Service Business 8.1 (2014):
    1-27.
    [14] Kenney, M., & Pon, B. (2011). Structuring the smartphone industry: is the
    Description: 碩士
    國立政治大學
    資訊管理研究所
    101356040
    102
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G1013560401
    Data Type: thesis
    Appears in Collections:[資訊管理學系] 學位論文

    Files in This Item:

    File SizeFormat
    040101.pdf1971KbAdobe PDF2115View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback