A Cloud-Based Compilation and Hardening Platform for Android Apps

被引:3
作者
Busch, Marcel [1 ]
Protsenko, Mykolai [2 ]
Mueller, Tilo [1 ]
机构
[1] Univ Erlangen Nurnberg, Erlangen, Germany
[2] Fraunhofer AISEC, Garching, Germany
来源
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017) | 2017年
关键词
Android; Software Protection; ART;
D O I
10.1145/3098954.3098959
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software piracy in general and repackaged apps with attached malware in particular pose serious threats for the Android ecosystem. In this paper, we present a cloud-compilation approach enabling sophisticated hardening of apps for non-rooted stock Android. Our design is based on off-device ahead-of-time compilation made possible by the Android Runtime (ART). Due to an installer-stub-based second-stage delivery, we stay compatible to established app store distribution processes. We argue with a significant gain in security for our approach, since an adversary's toolbox is usually aimed at exploiting the type-information-rich bytecode shipped with apps, which is stripped to a large extent and almost entirely useless for reverse engineering attacks. We confirm the gain in security by comparing the output of popular reverse engineering tools for original and stripped versions of 695 real-world apps in our test set. In average 81.5 % of an app's bytecode is no longer of use to reverse engineers. Complementing existing protection approaches, we propose a platform that can integrate bytecode-targeting protection solutions and offers binary-targeting hooks to incorporate advanced protection measures for ahead-of-time compiled apps. Our evaluation shows a negligible performance impact at runtime and demonstrates the approach's compatibility on our test set.
引用
收藏
页数:6
相关论文
共 20 条
[1]  
Anestis Bechtsoudis, 2015, FUZZ OBJ ART DIG NEW
[2]  
[Anonymous], 2012, INT C DET INTR MALW
[3]  
[Anonymous], 2012, P 2 ACM C DATA APPL, DOI DOI 10.1145/2133601.2133640
[4]  
Backes Michael, 2017, P 2 IEEE EUR S SEC P
[5]  
Bartkowiak A, 2012, FED CONF COMPUT SCI, P27
[6]  
Collberg Christian, 1997, Technical report
[7]   Watermarking, tamper-proofing, and obfuscation - Tools for software protection [J].
Collberg, CS ;
Thomborson, C .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (08) :735-746
[8]  
Desnos A, 2011, BLACK HAT ABU DHABI
[9]  
Gartner Inc., 2015, GARTN SAYS EM MARK D
[10]  
Google Inc, 2015, KEYN GOOGL I O 15