Skip to main content

2018 | OriginalPaper | Buchkapitel

A Java Code Protection Scheme via Dynamic Recovering Runtime Instructions

verfasst von : Sun Jiajia, Gao Jinbao, Tan Yu-an, Zhang Yu, Yu Xiao

Erschienen in: Algorithms and Architectures for Parallel Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As Android operating system and applications on the device play important roles, the security requirements of Android applications increased as well. With the upgrade of Android system, Android runtime mode (ART mode) has gradually become the mainstream architecture of the Android operating system. ART introduces several improvements in Android, but it also introduces new ways to enhance malicious activities. This paper proposed a confidential finer granularity protection scheme for application programs under ART mode of ROOT Android devices. Taking Java method as the protection granularity, the protection scheme increased the accuracy of protecting targets. In addition, the protection scheme provided a more thorough protection for applications by combining dynamic loading technology and encryption technology in ART mode, and improved the security of Android applications. Experiments showed that the proposed protection scheme is effective.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Portokalidis, G., et al.: Paranoid Android: versatile protection for smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference. ACM (2010) Portokalidis, G., et al.: Paranoid Android: versatile protection for smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference. ACM (2010)
3.
Zurück zum Zitat Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Secur. Priv. 7(1), 50–57 (2009)CrossRef Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Secur. Priv. 7(1), 50–57 (2009)CrossRef
5.
Zurück zum Zitat Shabtai, A., et al.: Google android: a state-of-the-art review of security mechanisms. arXiv preprint arXiv:0912.5101 (2009) Shabtai, A., et al.: Google android: a state-of-the-art review of security mechanisms. arXiv preprint arXiv:​0912.​5101 (2009)
6.
Zurück zum Zitat Aycock, J., Jacobson, M.: Anti-disassembly using cryptographic hash functions. J. Comput. Virol. 2(1), 79–85 (2006)CrossRef Aycock, J., Jacobson, M.: Anti-disassembly using cryptographic hash functions. J. Comput. Virol. 2(1), 79–85 (2006)CrossRef
7.
Zurück zum Zitat Lee, J., Kang, B., Im, E.G.: Evading anti-debugging techniques with binary substitution. Int. J. Secur. Appl. 8, 183–192 (2014) Lee, J., Kang, B., Im, E.G.: Evading anti-debugging techniques with binary substitution. Int. J. Secur. Appl. 8, 183–192 (2014)
8.
Zurück zum Zitat Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM (2003) Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM (2003)
9.
Zurück zum Zitat Chen, Q., Jia, L.F., Zhang, W.: Research of software protection methods based on the interaction between code and shell. Comput. Eng. Sci. 12, 011 (2006) Chen, Q., Jia, L.F., Zhang, W.: Research of software protection methods based on the interaction between code and shell. Comput. Eng. Sci. 12, 011 (2006)
10.
Zurück zum Zitat Costamagna, V., Zheng, C.: ARTDroid: a virtual-method hooking framework on android ART runtime. In: IMPS@ ESSoS, pp. 20–28 (2016) Costamagna, V., Zheng, C.: ARTDroid: a virtual-method hooking framework on android ART runtime. In: IMPS@ ESSoS, pp. 20–28 (2016)
11.
Zurück zum Zitat Xue, Y., Tan, Y.-A., Liang, C., Li, Y., Zheng, J., Zhang, Q.: RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444, 36–50 (2018)MathSciNetCrossRef Xue, Y., Tan, Y.-A., Liang, C., Li, Y., Zheng, J., Zhang, Q.: RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444, 36–50 (2018)MathSciNetCrossRef
12.
Zurück zum Zitat Enck, W., et al.: A study of android application security. In: USENIX Security Symposium, vol. 2 (2011) Enck, W., et al.: A study of android application security. In: USENIX Security Symposium, vol. 2 (2011)
13.
Zurück zum Zitat Yang, Z., et al.: Appintent: analyzing sensitive data transmission in android for privacy leakage detection. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM (2013) Yang, Z., et al.: Appintent: analyzing sensitive data transmission in android for privacy leakage detection. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM (2013)
14.
Zurück zum Zitat Backes, M., et al.: ARTist: the android runtime instrumentation and security toolkit. In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE (2017) Backes, M., et al.: ARTist: the android runtime instrumentation and security toolkit. In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE (2017)
15.
Zurück zum Zitat Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, Heidelberg (2013)MATH Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, Heidelberg (2013)MATH
16.
Zurück zum Zitat Guan, Z., Li, J., Wu, L., Zhang, Y., Wu, J., Du, X.: Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J. 4(6), 1934–1944 (2017)CrossRef Guan, Z., Li, J., Wu, L., Zhang, Y., Wu, J., Du, X.: Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J. 4(6), 1934–1944 (2017)CrossRef
17.
Zurück zum Zitat Xiao, Y., Changyou, Z., Yuan, X., Hongfei, Z., Yuanzhang, L., Yu-an, T.: An extra-parity energy saving data layout for video surveillance. Multimed. Tools Appl. 77, 4563–4583 (2018)CrossRef Xiao, Y., Changyou, Z., Yuan, X., Hongfei, Z., Yuanzhang, L., Yu-an, T.: An extra-parity energy saving data layout for video surveillance. Multimed. Tools Appl. 77, 4563–4583 (2018)CrossRef
18.
Zurück zum Zitat Sun, Z., Zhang, Q., Li, Y., Tan, Y.-A.: DPPDL: a dynamic partial-parallel data layout for green video surveillance storage. IEEE Trans. Circuits Syst. Video Technol. 28(1), 193–205 (2018) Sun, Z., Zhang, Q., Li, Y., Tan, Y.-A.: DPPDL: a dynamic partial-parallel data layout for green video surveillance storage. IEEE Trans. Circuits Syst. Video Technol. 28(1), 193–205 (2018)
Metadaten
Titel
A Java Code Protection Scheme via Dynamic Recovering Runtime Instructions
verfasst von
Sun Jiajia
Gao Jinbao
Tan Yu-an
Zhang Yu
Yu Xiao
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-05063-4_21