Have you ever wondered how many malicious applications use an application icon from a legit application?
We did the same and thought about implementing a cool signature to detect if a potential malicious application uses an icon of a benign application. To do so, we collected a large set of icons by extracting them from malicious applications. Afterwards, we selected those icons which looked familiar to us
more here........http://joe4security.blogspot.ch/2014/04/detecting-malware-by-using-application.html
We did the same and thought about implementing a cool signature to detect if a potential malicious application uses an icon of a benign application. To do so, we collected a large set of icons by extracting them from malicious applications. Afterwards, we selected those icons which looked familiar to us
more here........http://joe4security.blogspot.ch/2014/04/detecting-malware-by-using-application.html