期刊文献+

一种对Android应用资源索引表混淆方案的实现

An obfuscate implementation for Android resources index table
下载PDF
导出
摘要 由于Android应用具有被逆向、篡改、二次打包等风险,通过对Android应用中资源索引表文件进行混淆操作可以加大攻击者对Android应用逆向分析的难度。Android应用中的资源索引表记录着该应用所有的字符串信息。通过对资源文件索引表格式的研究,提出了一种基于字符串置换的混淆方法,实现了对资源文件索引表的混淆,加大了攻击者对Android应用逆向分析的难度。 Android application has risks of reverse, rewrite and repackage. Obfuscate Android resources index table will increase the difficulty of reverse analysis attack. Resources index table records the strings information in Android App. Through analyzing the structure of resources index table, a new obfuscate method was proposed to achieve obfuscate resources index table and increase the difficulty of reverse Android application.
作者 刘洋 文伟平
出处 《电信科学》 北大核心 2016年第10期22-26,26,共5页 Telecommunications Science
基金 国家自然科学基金资助项目(No.61170282) 信息网络安全公安部重点实验室基金资助项目(No.C14604)~~
关键词 ANDROID 资源文件索引表 混淆 Android resources index table obfuscate
  • 相关文献

参考文献8

  • 1App Brain Stats.Number of available Android applications[EB/OL].(2015-02-16)[2016-06-13].http://www.appbrain.corn/stats/.
  • 2卿斯汉.Android安全研究进展[J].软件学报,2016,27(1):45-71. 被引量:107
  • 3文伟平,张汉,曹向磊.基于Android可执行文件重组的混淆方案的设计与实现[J].信息网络安全,2016(5):71-77. 被引量:7
  • 4Shwen.微信Android资源混淆打包工具[EB/OL].(2015-10-12)[2016-06-30].http://mp.weixin.qq.com/s?__biz=Mz Aw NDY 1ODY2OQ==&mid=208135658&idx=1&sn=ac9bd6b4927e9e 82f9fa14e396183a8f#rd.
  • 5Beyond702.手把手教你解析resources.arsc[EB/OL].(2016-06-30)[2016-07-01].http://blog.csdn.net/beyond702/article/details/51744082.Beyond702.Teach you analyze resources.arsc hand by hand[EB/OL].(2016-06-30)[2016-07-01].http://blog.csdn.net/beyond70 2/article/details/51744082.
  • 6罗升阳.Android应用程序资源的编译和打包过程分析[EB/OL].(2013-04-15)[2016-07-01].http://blog.csdn.net/luoshengyang/article/details/8744683.
  • 7Shwen.A resource obfuscate tool for wechat Android App[EB/OL].(2015-10-12)[2016-06-30].http://mp.weixin.qq.com/s?__biz=Mz Aw NDY1ODY2OQ==&mid=208135658&idx=1&sn=ac9bd6b4927e9e 82f9fa14e396183a8f#rd.
  • 8LUO S Y.Compiling and packaging process for Android resource program analysis[EB/OL].(2013-04-15)[2016-07-01].http://blog.csdn.net/luoshengyang/article/details/8744683.

二级参考文献166

  • 1史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报(自然科学版),2005,33(6):813-819. 被引量:12
  • 2Motive Security Labs. Malware report--H2. 2014. http:/Pooletines.prisadigital.eom/MKT2015019837EN_2H2014.
  • 3Malware Report.pdf Mawston N. Strategy Analytics. Android shipped 1 billion smartphones worldwide in 2014. 2014. http://www.strategyanalyties.cora/ de fault.aspx?mod---reportabstraetviewer&a0= 10539.
  • 4Zhou Y, Jiang X. Dissecting android malware: Characterization and evolution. In: Prec. of the 2012 IEEE Syinp. on Security and Privacy (SP). 2012.95-109. [doi: 10.1109/SP.2012.16].
  • 5Felt AP, Firtifter M, Chin E, Hanna S, Wagner D. A survey of mobile malware in the wild. In: Proc. of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011). 2011, 3-14. [doi: 10.1145/2046614.2046618].
  • 6La Polla M, Martinelli F, Sgandurra D. A survey on security for mobile devices. IEEE Communications Surveys & Tutorials, 2013,15(1): 446--471. [doi: 10.1109/SURV.2012.013012.00028].
  • 7Enck W. Defending users against smartphone apps: Techniques and future directions. In: Proc. of the 7th Int'1 Conf. (ICISS 2011). LNCS 7093, Springer-Verlag, 2011.49-70. [doi: 10.1007/978-3-642-25560-1_3].
  • 8Fledel Y, Shabtai A, Potashnik D, Elovici Y. Google Android: An updated security review. In: Proe. of the 2nd Int'1 ICST Conf. (MobiCASE 2010). Springer-Verlag, 2010. 401-414. [doi: 10.1007/978-3-642-29336-8_29].
  • 9Shabtai A, Fledel Y, Kanonov U, Elovicil Y, Dolev S. Google Android: A state-of-the-art review of security mechanisms, arXiv:0912. 5101 [cs.CR], 2009. http://arxiv.org/ftp/arxiv/papers/0912/0912.5101 .pdf.
  • 10Burns J. Developing secure mobile applications for Android. 2008. https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/ isec securing_android apps .pdf.

共引文献111

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部