AEON
Autor: | Vivek Balachandran, Chua Wan Jun Melissa, D Geethanjali, Tan Li Ying |
---|---|
Rok vydání: | 2018 |
Předmět: |
Reverse engineering
Source code Java Computer science business.industry media_common.quotation_subject ComputingMilieux_LEGALASPECTSOFCOMPUTING 020206 networking & telecommunications 02 engineering and technology computer.software_genre Encryption ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS Bytecode Virtual machine Software security assurance 0202 electrical engineering electronic engineering information engineering Operating system 020201 artificial intelligence & image processing Android (operating system) business computer media_common computer.programming_language |
Zdroj: | CODASPY |
DOI: | 10.1145/3176258.3176943 |
Popis: | Android applications are vulnerable to reverse engineering which could result in tampering and repackaging of applications. Even though there are many off the shelf obfuscation tools that hardens Android applications, they are limited to basic obfuscation techniques. Obfuscation techniques that transform the code segments drastically are difficult to implement on Android because of the Android runtime verifier which validates the loaded code. In this paper, we introduce a novel obfuscation technique, Android Encryption based Obfuscation (AEON), which can encrypt code segments and perform runtime decryption during execution. The encrypted code is running outside of the normal Android virtual machine, in an embeddable Java source interpreter and thereby circumventing the scrutiny of Android runtime verifier. Our obfuscation technique works well with Android source code and Dalvik bytecode. |
Databáze: | OpenAIRE |
Externí odkaz: |