Hongyu Lin (Zhejiang University), Yicheng Hu (Zhejiang University), Haitao Xu (Zhejiang University), Yanchen Lu (Zhejiang University), Mengxia Ren (Zhejiang University), Shuai Hao (Old Dominion University), Chuan Yue (Colorado School of Mines), Zhao Li (Hangzhou Yugu Technology), Fan Zhang (Zhejiang University), Yixin Jiang (Electric Power Research Institute, CSG)

Chameleon apps evade iOS App Store review by presenting legitimate functionality during submission while transforming into illicit variants post-installation. While prevalent, their underlying transformation methods and developer-user collusion dynamics remain poorly understood. Existing detection approaches, constrained by static analysis or metadata dependencies, prove ineffective against hybrid implementations, novel variants, or metadata-scarce instances. To address these limitations, we establish a curated dataset of 500 iOS Chameleon apps collected through covert distribution channels, enabling systematic identification of 10 categories of distinct transformation patterns (including 4 previously undocumented variants). Building upon these findings, we present ChameleoScan, the first LLM-driven automated UI exploration framework for reliable Chameleon app verification. The system maintains local decision interpretability while ensuring global detection consistency through its core innovation - predictive metadata analytics, semantic interface comprehension, and human-comparable interaction strategies. Comprehensive evaluation on 1,644 iOS apps demonstrates operational efficacy (9.85% detection rate, 92.59% precision), with findings formally acknowledged by Apple. Implementation and datasets are available at https://github.com/ChameleoScan.

View More Papers

Auditable LLM Arbiter for DeFi Security: A Hybrid Graph-of-Thoughts...

Duanyi Yao (Navalabs), Siddhartha Jagannath (Navalabs), Baltasar Aroso (Navalabs), Vyas Krishnan (Navalabs), Ding Zhao (Navalabs)

Read More

Towards automated threat modeling for space systems via SPARTA...

Joonhyuk Park (School of Cybersecurity, Korea University), Jiwon Kwak (School of Cybersecurity, Korea University), Geunwoo Baek (School of Cybersecurity, Korea University), Dohee Kang (School of Cybersecurity, Korea University), Seungjoo Kim (School of Cybersecurity, Korea University)

Read More

LatticeBox: A Hardware-Software Co-Designed Framework for Scalable and Low-Latency...

ZhanPeng Liu (Peking University), Chenyang Li (Peking University), Wende Tan (Imperial College London), Yuan Li (Zhongguancun Laboratory), Xinhui Han (Peking University), Xi Cao (Science City (Guangzhou) Digital Technology Group Co., Ltd.), Yong Xie (Qinghai University), Chao Zhang (Tsinghua University)

Read More