首页> 外文期刊>Security and Communications Networks >Server-based code obfuscation scheme for APK tamper detection
【24h】

Server-based code obfuscation scheme for APK tamper detection

机译:用于APK篡改检测的基于服务器的代码混淆方案

获取原文
获取原文并翻译 | 示例
           

摘要

It is easy to decompile Android applications (or apps) owing to the structural characteristics of the app building process, but this ease makes them quite vulnerable to forgery or modification attacks. In particular, users may suffer direct financial loss if this vulnerability is exploited in security-critical private and business applications, such as online banking. One of the solutions to these problems is a code obfuscation technique. In this regard, DexGuard, which is based on ProGuard, which is integrated into the Android software development kit build system, has recently been introduced. Although DexGuard protects Android applications more effectively, an attacker is still able to analyze the hex code of a Dalvix Executable file. To resolve this weakness, we begin by analyzing the DexGuard tool from both a static and dynamic point of view. Our analysis reveals that DexGuard has some weaknesses. In this paper, we propose an obfuscation technique based on a client/server model with one-time secret key delivery using short message service or network protocol. The main concept is to store the core execute class file through obfuscation on the server, so when a program needs to execute core routines, it must request these routines from the server. In this way, we can protect Android apps from reverse engineering. Copyright (c) 2014 John Wiley & Sons, Ltd.
机译:由于应用程序构建过程的结构特点,很容易对Android应用程序进行反编译,但是这种简便性使其很容易受到伪造或修改攻击。特别是,如果此漏洞被用于安全关键的私有和商业应用程序(例如,在线银行)中,则用户可能会遭受直接的财务损失。解决这些问题的方法之一是代码混淆技术。在这方面,最近已经引入了基于ProGuard的DexGuard,该ProGuard已集成到Android软件开发工具包构建系统中。尽管DexGuard可以更有效地保护Android应用程序,但攻击者仍然能够分析Dalvix可执行文件的十六进制代码。为了解决这一弱点,我们首先从静态和动态的角度分析DexGuard工具。我们的分析表明,DexGuard有一些弱点。在本文中,我们提出了一种基于客户端/服务器模型的混淆技术,其中使用短消息服务或网络协议一次性传递密钥。主要概念是通过混淆将核心执行类文件存储在服务器上,因此,当程序需要执行核心例程时,它必须向服务器请求这些例程。这样,我们可以保护Android应用免受逆向工程的侵害。版权所有(c)2014 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号