Internetware 2025
Fri 20 - Sun 22 June 2025 Trondheim, Norway
co-located with FSE 2025

Android currently holds a significant share of the mobile market. However, the repackaging of Android applications is a widespread issue. Attackers can use repackaging to crack applications, insert malicious code, and add or replace advertisements. This poses a serious threat to the Android ecosystem. As such, detecting repackaged applications is of great importance. Noticing that repackaged applications seldom modify the GUI of the original applications, in recent years, researchers have proposed a series of dynamic software birthmarks based on the runtime GUI of the application to detect repackaged applications. However, existing dynamic GUI-based software falls short in three areas: (1) unreliable GUI dumping channel, (2) sensitive to widget position, and (3) slow birthmark generation. To address these limits, in this paper, we propose Box- Droid. In summary, BoxDroid offers a more reliable GUI dumping channel by disregarding transparent widgets or layouts. Additionally, it significantly increases the speed of birthmark generation through a DFS exploration strategy. Finally, it generates birthmarks using the distribution of the bounding boxes of widgets in each layout encountered at runtime. We have evaluated BoxDroid on 499 repackaging pairs and it shows a precision of 0.955 and a recall of 0.926. BoxDroid also detected 1,441 undocumented repackaging pairs in a dataset sampled from the RePack repository.

Fri 20 Jun

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

11:00 - 13:00
Keynote & Session1: Software Vulnerability and Security IResearch Track / Plenary Events at Cosmos 3A
Chair(s): William Chu Tunghai University
11:00
60m
Keynote
Keynote 2: Coding with the Machine: Promises and Perils in AI-Driven Software Engineering
Plenary Events
Leon Moonen Simula Research Laboratory
12:00
15m
Talk
Towards understanding the security issues of Python programs
Research Track
Hongcheng Fan Nanjing University, di liu Jiangsu Police Institute, Jielun Wu Nanjing University, Yang Feng Nanjing University, Qingkai Shi Nanjing University, Baowen Xu Nanjing University
12:15
15m
Talk
A Novel LLM Approach of Cybersecurity Threat Analysis and Response
Research Track
TIAN HU Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Shangyuan Zhuang Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, zhaorui Guo Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Jiyan Sun Institute of Information Engineering, Chinese Academy of Sciences,School of Cyber Security, University of Chinese Academy of Sciences, Yinlong Liu Institute of Information Engineering, Chinese Academy of Sciences,School of Cyber Security, University of Chinese Academy of Sciences, Wei Ma Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Hongchao Wang Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, zhaolingfeng Innovation Academy for Microsatellites of Chinese Academy of Science, zhangxiaojie Innovation Academy for Microsatellites of Chinese Academy of Science
12:30
15m
Talk
Measuring and Explaining the Effects of Android App Transformations in Online Malware Detection
Research Track
Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Zhixiu Guo Institute of Information Engineering, Chinese Academy of Sciences, China, Xiaodong Zhang University of Chinese Academy of Science, Haoyu Wang Huazhong University of Science and Technology, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Liu Nanyang Technological University
Pre-print
12:45
15m
Talk
Leveraging Visible Widget Sizes for Detecting Repackaged Android Apps
Research Track
Jun Ma Nanjing University, Weixiang Huang Nanjing University, Chun Cao Nanjing University
Pre-print

Information for Participants
Fri 20 Jun 2025 11:00 - 13:00 at Cosmos 3A - Keynote & Session1: Software Vulnerability and Security I Chair(s): William Chu
Info for room Cosmos 3A:

Cosmos 3A is the first room in the Cosmos 3 wing.

When facing the main Cosmos Hall, access to the Cosmos 3 wing is on the left, close to the stairs. The area is accessed through a large door with the number “3”, which will stay open during the event.

:
:
:
: