首页> 外文会议>International Conference on Dependability of Computer Systems >Android Methods Hooking Detection Using Dalvik Code and Dynamic Reverse Engineering by Stack Trace Analysis
【24h】

Android Methods Hooking Detection Using Dalvik Code and Dynamic Reverse Engineering by Stack Trace Analysis

机译:Android方法使用Dalvik码和动态逆向工程挂钩检测堆栈跟踪分析

获取原文

摘要

This research paper is focused on the issue of method hooking detection which in most of the existing solutions is focused on detection of the framework itself without checking of its real usage. The Authors proposed an algorithm that compares Dalvik bytecode from the application file with the stack trace of the executed code. Detection of the flow which is not a part of the app can be application method hooking. In this paper, the Authors ty to confirm it the concept can be used as a practical solution for the detection of this dynamic application tampering.
机译:本研究文件专注于方法挂钩检测问题,在大多数现有解决方案中,在没有检查其真实用法的情况下专注于检测框架本身。 作者提出了一种将DALVIK字节码与所执行代码的堆栈迹线进行比较从应用程序文件的算法。 检测到该应用的流量可以是应用方法挂钩。 在本文中,作者Ty要确认概念可以用作检测该动态应用篡改的实用解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号