Skip to main content

Research on Dynamic Safe Loading Techniques in Android Application Protection System

  • Conference paper
  • First Online:
  • 1789 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10699))

Abstract

Android is a widespread used embedded system. The number of Android applications has been rapidly growing. Because of Android open source policy and limited application security mechanism, Android applications are confronted with many serious security threats. By malicious reverse and illegal tampering, thousands of Android applications have been infected and millions of users have been exposed to dangers. In this paper, we proposed an improved Android applications protection system based on DEX block encryption and multi-file features checksum. Experiment results show that the proposed system is more reliable than the commonly-used Android application protection systems when facing with attack tools such as APK Tools and IDA pro.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Google Android Security Team: Android security 2016 year in review. Technical report (2017)

    Google Scholar 

  2. Google Android Security Team: Android security 2015 year in review. Technical report (2016)

    Google Scholar 

  3. Suarez-Tangil, G., Tapiador, J.E., Peris-Lopez, P., et al.: Evolution, detection and analysis of malware for smart devices. IEEE Commun. Surv. Tutor. 16(2), 961–987 (2014)

    Article  Google Scholar 

  4. Rastogi, V., Chen, Y., Jiang, X.: Catch me if you can: evaluating android anti-malware against transformation attacks. IEEE Trans. Inf. Forensics Secur. 9(1), 99–108 (2013)

    Article  Google Scholar 

  5. Wheeler, D.M., Conyers, A., Luo, J., et al.: Java security extensions for a Java server in a hostile environment. In: Computer Security Applications Conference, p. 64. IEEE Computer Society (2001)

    Google Scholar 

  6. Garber, L.: Have Java’s security issues gotten out of hand? Computer 45(12), 18–21 (2012)

    Article  Google Scholar 

  7. Lin, Y.D., Huang, C.Y., Wright, M., et al.: Mobile application security. Computer 47(6), 21–23 (2014)

    Article  Google Scholar 

  8. Fernandes, E., Crispo, B., Conti, M.: FM, 99.9, radio virus: exploiting FM radio broadcasts for malware deployment. IEEE Trans. Inf. Forensics Secur. 8(6), 1027–1037 (2013)

    Article  Google Scholar 

  9. Davi, L., Koeberl, P., Sadeghi, A.R.: Hardware-assisted fine-grained control-flow integrity: towards efficient protection of embedded systems against software exploitation. IEEE (2014)

    Google Scholar 

  10. Bertels, K., Sima, V.M., Yankova, Y., et al.: HArtes: hardware-software codesign for heterogeneous multicore platforms. IEEE Micro 30(5), 88–97 (2010)

    Article  Google Scholar 

  11. Xi, K., Hu, J.: Dual layer structure check (DLSC) fingerprint verification scheme designed for biometric mobile template protection. In: ICIEA 2009 IEEE Conference on Industrial Electronics and Applications, pp. 630–635. IEEE (2009)

    Google Scholar 

  12. Huang, N., Huang, X.T., He, X.W.: A new algorithm of software copyright protection based on multi-scale triangular mapping. In: International Symposium on Information Science and Engineering, pp. 472–475 (2011)

    Google Scholar 

  13. Zhangjie, F., Shu, J., Sun, X., Linge, N.: Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans. Consum. Electron. 60(4), 762–770 (2014)

    Article  Google Scholar 

  14. Mller, T., Freiling, F.C.: A systematic assessment of the security of full disk encryption. IEEE Trans. Dependable Secur. Comput. 12(5), 491–503 (2015)

    Article  Google Scholar 

  15. Saha, D., Sur-Kolay, S.: Watermarking in hard intellectual property for pre-fab and post-fab verification. IEEE Trans. Very Large Scale Integr. Syst. 23(5), 801–809 (2015)

    Article  Google Scholar 

  16. Piper, A., Safavi-Naini, R.: Scalable fragile watermarking for image authentication. IET Inf. Secur. 7(4), 300–311 (2013)

    Article  Google Scholar 

  17. Kanuparthi, A.K., Zahran, M., Karri, R.: Architecture support for dynamic integrity checking. IEEE Trans. Inf. Forensics Secur. 7(1), 321–332 (2012)

    Article  Google Scholar 

  18. Kayaalp, M., Ozsoy, M., Ghazaleh, N.A., et al.: Efficiently securing systems from code reuse attacks. IEEE Trans. Comput. 63(5), 1144–1156 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  19. Collberg, C.S., Thomborson, C.D., Low, D.W.K.: Obfuscation techniques for enhancing software security: CA. US6668325 (2003)

    Google Scholar 

  20. Collberg, C., Thomborson, C., Low, D.: A Taxonomy of Obfuscating Transformations. Department of Computer Science the University of Auckland New Zealand (1997)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China under Grants NSFC 61672358.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Shubin Cai , Jinwen Jiang , Zhong Ming or Zhengping Liang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cai, S. et al. (2018). Research on Dynamic Safe Loading Techniques in Android Application Protection System. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2017. Lecture Notes in Computer Science(), vol 10699. Springer, Cham. https://doi.org/10.1007/978-3-319-73830-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73830-7_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73829-1

  • Online ISBN: 978-3-319-73830-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics