【24h】

Uncovering Self Code Modification in Android

机译:在Android中发现自我代码修改

获取原文

摘要

Android has proved itself to be the defacto standard for smart phones. Today Android claims a major share of smart phones OS market . The increasing popularity of Android has attracted attention of developers from around the globe in a very short span of time. Concerns and resultantly techniques involving code protection were evolved. The techniques were focused to hide sensitive logic of important pieces of code.These techniques were also used by malicious code writers to hide the malicious functionality of their code. This paper will analyze the techniques being employed in Android applications for code obfuscation. In addition, one of obfuscation technique i.e. runtime code modification in Android would be analyzed in detail.The major part of the paper would focus on tools and techniques for extracting dex files from the memory and analyzing them in order to recover code which has been injected in application process during runtime and is actually being executed in the memory.
机译:Android已证明自己是智能手机的Defacto标准。今天Android声称智能手机OS市场的主要份额。 Android的越来越普及引起了从全球各地的开发人员的关注,在很短的时间内。涉及涉及代码保护的担忧和结果技术。这些技术集中起来隐藏重要代码的敏感逻辑。这些技术也被恶意代码编写者使用的技术来隐藏其代码的恶意功能。本文将分析在Android应用程序中采用的技术进行代码混淆。此外,还将详细分析混淆技术的一种混淆技术在运行时期间的应用程序过程,实际上正在存储在内存中。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号