Abstract
Android is a widespread used embedded system. The number of Android applications has been rapidly growing. Because of Android open source policy and limited application security mechanism, Android applications are confronted with many serious security threats. By malicious reverse and illegal tampering, thousands of Android applications have been infected and millions of users have been exposed to dangers. In this paper, we proposed an improved Android applications protection system based on DEX block encryption and multi-file features checksum. Experiment results show that the proposed system is more reliable than the commonly-used Android application protection systems when facing with attack tools such as APK Tools and IDA pro.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Google Android Security Team: Android security 2016 year in review. Technical report (2017)
Google Android Security Team: Android security 2015 year in review. Technical report (2016)
Suarez-Tangil, G., Tapiador, J.E., Peris-Lopez, P., et al.: Evolution, detection and analysis of malware for smart devices. IEEE Commun. Surv. Tutor. 16(2), 961–987 (2014)
Rastogi, V., Chen, Y., Jiang, X.: Catch me if you can: evaluating android anti-malware against transformation attacks. IEEE Trans. Inf. Forensics Secur. 9(1), 99–108 (2013)
Wheeler, D.M., Conyers, A., Luo, J., et al.: Java security extensions for a Java server in a hostile environment. In: Computer Security Applications Conference, p. 64. IEEE Computer Society (2001)
Garber, L.: Have Java’s security issues gotten out of hand? Computer 45(12), 18–21 (2012)
Lin, Y.D., Huang, C.Y., Wright, M., et al.: Mobile application security. Computer 47(6), 21–23 (2014)
Fernandes, E., Crispo, B., Conti, M.: FM, 99.9, radio virus: exploiting FM radio broadcasts for malware deployment. IEEE Trans. Inf. Forensics Secur. 8(6), 1027–1037 (2013)
Davi, L., Koeberl, P., Sadeghi, A.R.: Hardware-assisted fine-grained control-flow integrity: towards efficient protection of embedded systems against software exploitation. IEEE (2014)
Bertels, K., Sima, V.M., Yankova, Y., et al.: HArtes: hardware-software codesign for heterogeneous multicore platforms. IEEE Micro 30(5), 88–97 (2010)
Xi, K., Hu, J.: Dual layer structure check (DLSC) fingerprint verification scheme designed for biometric mobile template protection. In: ICIEA 2009 IEEE Conference on Industrial Electronics and Applications, pp. 630–635. IEEE (2009)
Huang, N., Huang, X.T., He, X.W.: A new algorithm of software copyright protection based on multi-scale triangular mapping. In: International Symposium on Information Science and Engineering, pp. 472–475 (2011)
Zhangjie, F., Shu, J., Sun, X., Linge, N.: Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans. Consum. Electron. 60(4), 762–770 (2014)
Mller, T., Freiling, F.C.: A systematic assessment of the security of full disk encryption. IEEE Trans. Dependable Secur. Comput. 12(5), 491–503 (2015)
Saha, D., Sur-Kolay, S.: Watermarking in hard intellectual property for pre-fab and post-fab verification. IEEE Trans. Very Large Scale Integr. Syst. 23(5), 801–809 (2015)
Piper, A., Safavi-Naini, R.: Scalable fragile watermarking for image authentication. IET Inf. Secur. 7(4), 300–311 (2013)
Kanuparthi, A.K., Zahran, M., Karri, R.: Architecture support for dynamic integrity checking. IEEE Trans. Inf. Forensics Secur. 7(1), 321–332 (2012)
Kayaalp, M., Ozsoy, M., Ghazaleh, N.A., et al.: Efficiently securing systems from code reuse attacks. IEEE Trans. Comput. 63(5), 1144–1156 (2014)
Collberg, C.S., Thomborson, C.D., Low, D.W.K.: Obfuscation techniques for enhancing software security: CA. US6668325 (2003)
Collberg, C., Thomborson, C., Low, D.: A Taxonomy of Obfuscating Transformations. Department of Computer Science the University of Auckland New Zealand (1997)
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China under Grants NSFC 61672358.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Cai, S. et al. (2018). Research on Dynamic Safe Loading Techniques in Android Application Protection System. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2017. Lecture Notes in Computer Science(), vol 10699. Springer, Cham. https://doi.org/10.1007/978-3-319-73830-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-73830-7_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73829-1
Online ISBN: 978-3-319-73830-7
eBook Packages: Computer ScienceComputer Science (R0)