Skip to main content
Top

2018 | OriginalPaper | Chapter

A Java Code Protection Scheme via Dynamic Recovering Runtime Instructions

Authors : Sun Jiajia, Gao Jinbao, Tan Yu-an, Zhang Yu, Yu Xiao

Published in: Algorithms and Architectures for Parallel Processing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As Android operating system and applications on the device play important roles, the security requirements of Android applications increased as well. With the upgrade of Android system, Android runtime mode (ART mode) has gradually become the mainstream architecture of the Android operating system. ART introduces several improvements in Android, but it also introduces new ways to enhance malicious activities. This paper proposed a confidential finer granularity protection scheme for application programs under ART mode of ROOT Android devices. Taking Java method as the protection granularity, the protection scheme increased the accuracy of protecting targets. In addition, the protection scheme provided a more thorough protection for applications by combining dynamic loading technology and encryption technology in ART mode, and improved the security of Android applications. Experiments showed that the proposed protection scheme is effective.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Portokalidis, G., et al.: Paranoid Android: versatile protection for smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference. ACM (2010) Portokalidis, G., et al.: Paranoid Android: versatile protection for smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference. ACM (2010)
3.
go back to reference Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Secur. Priv. 7(1), 50–57 (2009)CrossRef Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Secur. Priv. 7(1), 50–57 (2009)CrossRef
5.
6.
go back to reference Aycock, J., Jacobson, M.: Anti-disassembly using cryptographic hash functions. J. Comput. Virol. 2(1), 79–85 (2006)CrossRef Aycock, J., Jacobson, M.: Anti-disassembly using cryptographic hash functions. J. Comput. Virol. 2(1), 79–85 (2006)CrossRef
7.
go back to reference Lee, J., Kang, B., Im, E.G.: Evading anti-debugging techniques with binary substitution. Int. J. Secur. Appl. 8, 183–192 (2014) Lee, J., Kang, B., Im, E.G.: Evading anti-debugging techniques with binary substitution. Int. J. Secur. Appl. 8, 183–192 (2014)
8.
go back to reference Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM (2003) Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM (2003)
9.
go back to reference Chen, Q., Jia, L.F., Zhang, W.: Research of software protection methods based on the interaction between code and shell. Comput. Eng. Sci. 12, 011 (2006) Chen, Q., Jia, L.F., Zhang, W.: Research of software protection methods based on the interaction between code and shell. Comput. Eng. Sci. 12, 011 (2006)
10.
go back to reference Costamagna, V., Zheng, C.: ARTDroid: a virtual-method hooking framework on android ART runtime. In: IMPS@ ESSoS, pp. 20–28 (2016) Costamagna, V., Zheng, C.: ARTDroid: a virtual-method hooking framework on android ART runtime. In: IMPS@ ESSoS, pp. 20–28 (2016)
11.
go back to reference Xue, Y., Tan, Y.-A., Liang, C., Li, Y., Zheng, J., Zhang, Q.: RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444, 36–50 (2018)MathSciNetCrossRef Xue, Y., Tan, Y.-A., Liang, C., Li, Y., Zheng, J., Zhang, Q.: RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444, 36–50 (2018)MathSciNetCrossRef
12.
go back to reference Enck, W., et al.: A study of android application security. In: USENIX Security Symposium, vol. 2 (2011) Enck, W., et al.: A study of android application security. In: USENIX Security Symposium, vol. 2 (2011)
13.
go back to reference Yang, Z., et al.: Appintent: analyzing sensitive data transmission in android for privacy leakage detection. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM (2013) Yang, Z., et al.: Appintent: analyzing sensitive data transmission in android for privacy leakage detection. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM (2013)
14.
go back to reference Backes, M., et al.: ARTist: the android runtime instrumentation and security toolkit. In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE (2017) Backes, M., et al.: ARTist: the android runtime instrumentation and security toolkit. In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE (2017)
15.
go back to reference Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, Heidelberg (2013)MATH Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, Heidelberg (2013)MATH
16.
go back to reference Guan, Z., Li, J., Wu, L., Zhang, Y., Wu, J., Du, X.: Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J. 4(6), 1934–1944 (2017)CrossRef Guan, Z., Li, J., Wu, L., Zhang, Y., Wu, J., Du, X.: Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J. 4(6), 1934–1944 (2017)CrossRef
17.
go back to reference Xiao, Y., Changyou, Z., Yuan, X., Hongfei, Z., Yuanzhang, L., Yu-an, T.: An extra-parity energy saving data layout for video surveillance. Multimed. Tools Appl. 77, 4563–4583 (2018)CrossRef Xiao, Y., Changyou, Z., Yuan, X., Hongfei, Z., Yuanzhang, L., Yu-an, T.: An extra-parity energy saving data layout for video surveillance. Multimed. Tools Appl. 77, 4563–4583 (2018)CrossRef
18.
go back to reference Sun, Z., Zhang, Q., Li, Y., Tan, Y.-A.: DPPDL: a dynamic partial-parallel data layout for green video surveillance storage. IEEE Trans. Circuits Syst. Video Technol. 28(1), 193–205 (2018) Sun, Z., Zhang, Q., Li, Y., Tan, Y.-A.: DPPDL: a dynamic partial-parallel data layout for green video surveillance storage. IEEE Trans. Circuits Syst. Video Technol. 28(1), 193–205 (2018)
Metadata
Title
A Java Code Protection Scheme via Dynamic Recovering Runtime Instructions
Authors
Sun Jiajia
Gao Jinbao
Tan Yu-an
Zhang Yu
Yu Xiao
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-05063-4_21

Premium Partner