2019
DOI: 10.1109/access.2019.2921417
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Binary-Level Code Virtualization to Protect Android Applications Against App Repackaging

Abstract: Application repackaging is a severe problem for Android systems. Many Android malware programs pass the mobile platform fundamental security barriers through repackaging other legitimate apps. Most of the existing anti-repackaging schemes only work at the Android DEX bytecode level, but not for the shared object files consisting of native ARM-based machine instructions. Lacking the protection at the native machine code level opens a door for attackers to launch repackaging attacks on the shared libraries that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…A virtual machine (VM) executes inside the app and interprets the virtual instructions. Two different approaches are proposed in [25,26]; the first one works at DEX level, while the latter focuses on native libraries. Similarly to obfuscation, this approach aims at complicating the reverse engineering process of an app, but it does not introduce any anti-tampering check.…”
Section: Anti-repackagingmentioning
confidence: 99%
“…A virtual machine (VM) executes inside the app and interprets the virtual instructions. Two different approaches are proposed in [25,26]; the first one works at DEX level, while the latter focuses on native libraries. Similarly to obfuscation, this approach aims at complicating the reverse engineering process of an app, but it does not introduce any anti-tampering check.…”
Section: Anti-repackagingmentioning
confidence: 99%
“…The compression encryption [3] is different from obfuscated code [4] essentially. The obfuscated code blocks the normal understanding by disturbing instructions' logic [5], however, we still can get the encrypted source code whether by static analysis or dynamic analysis. But when facing the compression encryption such as UPX [6], the static analysis loses effect immediately, and the dynamic analysis can be stopped by anti debug techniques such as timeout detection [7] or attached detection [8].…”
Section: ) How To Collect the Source Instructions When Facing The Compression Encryption?mentioning
confidence: 99%
“…In application development, there are always hackers who try to exploit/attack applications developed in the form of reverse engineering, including Application Repackaging, which is a common and severe threat in the world of Android Signature Verification Based on Dex CRC and Blake2 Algorithm to Prevent Reverse Engineering Attack in Android Application application development. Hackers can use reverse engineering tools to disassemble an app and change, insert, modify the source code or make fake purchases [2].…”
Section: Introductionmentioning
confidence: 99%