Anti-debugging scheme for protecting mobile apps on android platform

被引:17
作者
Cho, Haehyun [1 ]
Lim, Jongsu [1 ]
Kim, Hyunki [1 ]
Yi, Jeong Hyun [1 ]
机构
[1] Soongsil Univ, Sch Comp Sci & Engn, Seoul 156743, South Korea
基金
新加坡国家研究基金会;
关键词
Anti-reversing; Android APP protection; Detecting emulator; Anti-debugging;
D O I
10.1007/s11227-015-1559-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Android application package file, APK file, can be easily decompiled using Android reverse engineering tools. Thus, general apps can be easily transformed into malicious application through reverse engineering and analysis. These repacked apps could be uploaded in general android app market called Google Play Store and redistributed. To prevent theses malicious behaviors such as malicious code injection or code falsifications, many techniques and tools were developed. However, these techniques also can be analyzed using debuggers. Also, analyzed apps can be tampered easily. For example, when applying anti-analysis techniques to android apps using Dexprotector which is commercial tool for protecting android app, it can be seen that these techniques can also be analyzed using debugger. In this paper, to protect the android app from the attack using debugger, we propose anti-debugging techniques for native code debugging and managed code debugging of android apps.
引用
收藏
页码:232 / 246
页数:15
相关论文
共 10 条
[1]  
[Anonymous], 2011, USENIX SEC S
[2]  
Bornstein Dan., 2008, Google I/O Developer Conference, V23, P17
[3]   Software protection through anti-debugging [J].
Gagnon, Michael N. ;
Taylor, Stephen ;
Ghosh, Anup K. .
IEEE SECURITY & PRIVACY, 2007, 5 (03) :82-84
[4]  
Huang J., 2012, UNDERSTANDING DALVIK
[5]   Repackaging Attack on Android Banking Applications and Its Countermeasures [J].
Jung, Jin-Hyuk ;
Kim, Ju Young ;
Lee, Hyeong-Chan ;
Yi, Jeong Hyun .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 73 (04) :1421-1437
[6]  
Khan S., 2009, Analysis of Dalvik Virtual Machine and Class Path Library
[7]  
Lee C, 2013, J SECUR ENG, V10, P41
[8]  
Schallner M, 2006, CODE BREAK MAG SECUR, V1, P3
[9]  
Schulz P., 2012, CODE PROTECTION ANDR
[10]  
Selvakumar G, 2012, THESIS U KANSAS