Advertisement

Towards Android Application Protection via Kernel Extension

  • Tuo Wang
  • Lu Liu
  • Chongzhi Gao
  • Jingjing Hu
  • Jingyu Liu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11338)

Abstract

As an integral part of Android system security, Android application protection has always been favored by researchers. The current popular protection schemes include the source code confusion, anti-debugging technology, and confusions of executable files. However, these schemes modify the applications more or less undoubtedly, and that causes inconvenience while these applications are running. This article proposes a kernel-level Android application protection scheme which can eliminate the need for additional application modifications and protect all application data. Therefore, we designed an encryption system and implemented a prototype system Godzilla on the basis of the Linux kernel 3.18.14 in order to verify the validity of the design. Experiments show that the system can achieve our goals well. Compared to non-protected applications, protected ones will have corresponding time loss during installation and startup, but they are all within acceptable limits.

Keywords

Android application Kernel Encryption system 

Notes

Acknowledgement

This work was supported by Guangzhou scholars project for universities of Guangzhou (No. 1201561613).

References

  1. 1.
    Developers, Android. What is android (2011)Google Scholar
  2. 2.
  3. 3.
    Hur, J.B., Shamsi, J.A.: A survey on security issues, vulnerabilities and attacks in Android based smartphone. In: 2017 International Conference on Information and Communication Technologies (ICICT), pp. 40–46. IEEE (2017)Google Scholar
  4. 4.
    Xue, Y., Tan, Y., Liang, C., Li, Y., Zheng, J., Zhang, Q.: RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444, 36–50 (2018)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Tan, Y., et al.: A root privilege management scheme with revocable authorization for Android devices. J. Netw. Comput. 107(4), 69–82 (2018)CrossRefGoogle Scholar
  6. 6.
    Xue, Y., Tan, Y., Liang, C., Zhang, C., Zheng, J.: An optimized data hiding scheme for deflate codes. Soft. Comput. 22(13), 4445–4455 (2018)CrossRefGoogle Scholar
  7. 7.
    Kovacheva, A.: Efficient code obfuscation for Android. In: Papasratorn, B., Charoenkitkarn, N., Vanijja, V., Chongsuphajaisiddhi, V. (eds.) IAIT 2013. CCIS, vol. 409, pp. 104–119. Springer, Cham (2013).  https://doi.org/10.1007/978-3-319-03783-7_10CrossRefGoogle Scholar
  8. 8.
    Wan, J.: Android app protection through anti-tampering and anti-debugging techniques. Ph.D. dissertation, Queen’s University (Canada) (2018)Google Scholar
  9. 9.
    Love, R.: Linux kernel development. System 66(66), 69–70 (2005). Author, F.: Article title. Journal 2(5), 99–110 (2016)Google Scholar
  10. 10.
    Saout, C.: dm-crypt: a device-mapper crypto target (2007). http://www.saout.de/misc/dm-crypt (2014)
  11. 11.
    Corbet, J., LWN.net Weekly: Ext4 encryption. Lwn.net (2015)Google Scholar
  12. 12.
    Zhang, X., et al.: Cryptographic key protection against FROST for mobile devices. Clust. Comput. 20(3), 2393–2402 (2017)CrossRefGoogle Scholar
  13. 13.
    Gorman, M.: Understanding the Linux Virtual Memory Manager. Prentice Hall, Upper Saddle River (2004)Google Scholar
  14. 14.
    Google Play Store. https://play.google.com/store/apps/collection/topselling_free. Accessed 29 May 2018
  15. 15.
    AutoMatorX. https://github.com/NetEaseGame/ATX. Accessed 29 May 2018

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Tuo Wang
    • 1
  • Lu Liu
    • 1
  • Chongzhi Gao
    • 2
  • Jingjing Hu
    • 1
  • Jingyu Liu
    • 3
  1. 1.School of Computer Science and TechnologyBeijing Institute of TechnologyBeijingChina
  2. 2.School of Computer ScienceGuangzhou UniversityGuangzhouChina
  3. 3.School of Artificial IntelligenceHebei University of TechnologyTianjinChina

Personalised recommendations