Skip to main content

2019 | OriginalPaper | Buchkapitel

A Code Protection Scheme via Inline Hooking for Android Applications

verfasst von : Hongwei Jiang, Kai Yang, Lianfang Wang, Jinbao Gao, Sikang Hu

Erschienen in: Cyberspace Safety and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, more and more criminals tamper with APKs (Android Package) of Android phones by reverse engineering, which brings great threat to the interests of developers and users. Therefore, it is necessary to strengthen the protection of APK code. But with the continuous evolution of the Android system compilation mode, the protection of APK code has encountered more and more difficulties. Main code protection schemes are just for applications based on Interpretation or AOT (Ahead of Time) compilation mode, but the new hybrid compilation mode used in Android 8.0 makes it difficult for the code protection schemes to protect APK code. So we refer to the Android system source code to study the hybrid compilation process of Android 8.0. By analyzing the loading, compiling and executing flow of programs in Android 8.0, we find a way to control the compilation mode. Combined with inline hook technology, our code protection scheme effectively avoids the impact of the complicated hybrid compilation mode, restores the instructions successfully and achieves the purpose of protecting APK code.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mulliner, C., Oberheide, J., Robertson, W., Kirda, E.: PatchDroid: scalable third-party security patches for Android device. In: Computer Security Applications Conference (2013) Mulliner, C., Oberheide, J., Robertson, W., Kirda, E.: PatchDroid: scalable third-party security patches for Android device. In: Computer Security Applications Conference (2013)
2.
Zurück zum Zitat Shreshtha, R.: A systemic code-protection methodology for the dex file on Android platform. In: Proceedings of 2012 IEEE International Conference on Computer Science and Automation Engineering (2012) Shreshtha, R.: A systemic code-protection methodology for the dex file on Android platform. In: Proceedings of 2012 IEEE International Conference on Computer Science and Automation Engineering (2012)
3.
Zurück zum Zitat Zhou, W., Wang, Z., Zhou, Y., Jiang, X.: DILIVAR: diversifying intermediate language for anti-repackaging on Android platform. In: ACM Conference on Data & Application Security & Privacy (2014) Zhou, W., Wang, Z., Zhou, Y., Jiang, X.: DILIVAR: diversifying intermediate language for anti-repackaging on Android platform. In: ACM Conference on Data & Application Security & Privacy (2014)
4.
Zurück zum Zitat Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid Android: versatile protection for smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference (2010) Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid Android: versatile protection for smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference (2010)
7.
Zurück zum Zitat Chen, Q., Jia, L.-f., Zhang, W.: Research of software protection methods based on the interaction between code and shell. Comput. Eng. Sci. 12 (2006). 011 Chen, Q., Jia, L.-f., Zhang, W.: Research of software protection methods based on the interaction between code and shell. Comput. Eng. Sci. 12 (2006). 011
9.
Zurück zum Zitat Bryant, R.E., O’Hallaran, D.R.: Computer Systems: A Programmer’s Perspective. Pearson, London (2015) Bryant, R.E., O’Hallaran, D.R.: Computer Systems: A Programmer’s Perspective. Pearson, London (2015)
10.
Zurück zum Zitat Zhang, Y., Luo, X., Yin, H.: The terminator to Android hardening services. In: DEFCON 25 Hacker Conference (2017) Zhang, Y., Luo, X., Yin, H.: The terminator to Android hardening services. In: DEFCON 25 Hacker Conference (2017)
11.
Zurück zum Zitat Xue, Y., Tan, Y., Liang, C., Li, Y., Zheng, J., Zhang, Q.: RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444, 36–50 (2018)MathSciNetCrossRef Xue, Y., Tan, Y., Liang, C., Li, Y., Zheng, J., Zhang, Q.: RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444, 36–50 (2018)MathSciNetCrossRef
13.
Zurück zum Zitat Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2013)MATH Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2013)MATH
17.
Zurück zum Zitat Yang, Z., et al.: Appintent: analyzing sensitive data transmission in Android for privacy leakage detection. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (2013) Yang, Z., et al.: Appintent: analyzing sensitive data transmission in Android for privacy leakage detection. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (2013)
18.
Zurück zum Zitat Grassi, M.: Reverse engineering, pentesting, and hardening of Android apps. DroidCon (2014) Grassi, M.: Reverse engineering, pentesting, and hardening of Android apps. DroidCon (2014)
20.
Zurück zum Zitat Tsai, K.-Y., Chiu, Y.-H., Wu, T.-C.: Android App copy protection mechanism based on dynamic loading. In: International Symposium on Consumer Electronics (2014) Tsai, K.-Y., Chiu, Y.-H., Wu, T.-C.: Android App copy protection mechanism based on dynamic loading. In: International Symposium on Consumer Electronics (2014)
21.
Zurück zum Zitat Wißfeld, M.: ArtHook Callee-side method hook injection on the new Android runtime ART. Information Security and Cryptography (2015) Wißfeld, M.: ArtHook Callee-side method hook injection on the new Android runtime ART. Information Security and Cryptography (2015)
23.
Zurück zum Zitat Liang, S.: The Java Native Interface – Programmer’s Guide and Specification. Addison-Wesley Professional, Boston (1999) Liang, S.: The Java Native Interface – Programmer’s Guide and Specification. Addison-Wesley Professional, Boston (1999)
24.
Zurück zum Zitat Drake, J.J., Lanier, Z., Mulliner, C., Fora, P.O., Ridley, S.A., Wicherski, G.: Android Hacker’s Handbook. Wiley, Hoboken (2014) Drake, J.J., Lanier, Z., Mulliner, C., Fora, P.O., Ridley, S.A., Wicherski, G.: Android Hacker’s Handbook. Wiley, Hoboken (2014)
25.
Zurück zum Zitat Eagle, C.: The IDA Pro Book. No Starch Press, San Francisco (2011) Eagle, C.: The IDA Pro Book. No Starch Press, San Francisco (2011)
26.
Zurück zum Zitat Martelli, A., Ravenscroft, A., Ascher, D.: Python Cookbook. O’Reilly Media, Sebastopol (2005) Martelli, A., Ravenscroft, A., Ascher, D.: Python Cookbook. O’Reilly Media, Sebastopol (2005)
27.
Zurück zum Zitat Chen, H.: Privacy and Security Enhancements for Android Application. University of California, Los Angeles (2012) Chen, H.: Privacy and Security Enhancements for Android Application. University of California, Los Angeles (2012)
28.
Zurück zum Zitat Levin, J.: Dalvik and ART. In: Andevcon (2015) Levin, J.: Dalvik and ART. In: Andevcon (2015)
30.
Zurück zum Zitat Park, Y.: We can still crack you! general unpacking method for Android packer (no root). In: Blackhat Asia (2015) Park, Y.: We can still crack you! general unpacking method for Android packer (no root). In: Blackhat Asia (2015)
Metadaten
Titel
A Code Protection Scheme via Inline Hooking for Android Applications
verfasst von
Hongwei Jiang
Kai Yang
Lianfang Wang
Jinbao Gao
Sikang Hu
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-37337-5_9