期刊文献+

函数Native化的Android APP加固方法 被引量:3

Android APP reinforcement method with function Nativeization
下载PDF
导出
摘要 调研动态恢复攻击的逻辑思路和Android APP中函数调用执行流程.通过对原DEX文件进行重构和加密,将其关键Java函数属性改为Native,并添加壳DEX文件; Android APP启动后首先执行壳DEX文件,然后对原DEX进行解密和动态加载,当调用被保护函数时,保持该函数在内存中的Native属性,通过Hook技术和反射机制隐式恢复并执行原Java函数.实验和对比分析结果表明,该方法能够在较低资源损耗和无需反编译源码的前提下获取高强度的保护效果,可以有效抵御静态分析攻击、DEX动态恢复和动态脱壳攻击. The logic of dynamic recovery attack and the function call execution flow in Android APP was investigated.The original DEX file was reconstructed and encrypted;its key Java function attribute was changed to Native,and the shell DEX file was added.When the Android APP was started,the shell DEX file was executed first,and then the original DEX was decrypted and loaded dynamically.When the protected function was called,the Native property of the function in memory was maintained,and the original Java function was implicitly restored and executed by the Hook technique and the reflection mechanism.The experimental results show that the method obtains high level of protection without Source decompilation at lower resource losses,and can effectively resist static analysis attacks,DEX dynamic recovery and dynamic shelling attacks.
作者 宋言言 罗森林 尚海 潘丽敏 张笈 SONG Yan-yan;LUO Sen-lin;SHANG Hai;PAN Li-min;ZHANG Ji(School of Information and Electronics,Beijing Instutitute of Technology,Beijing 100081,China)
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2019年第3期555-562,共8页 Journal of Zhejiang University:Engineering Science
关键词 APP加固 函数Native化 HOOK技术 动态加载 ANDROID系统 APP reinforcement function-Nativezation Hook technology dynamic loading Android System
  • 相关文献

参考文献1

二级参考文献8

  • 1IDC. Smartphone OS Market Share[EB/OL]. [2016- 01 08]. http=//www, idc. com/prodserv/smartphone- os-market-share, j sp.
  • 2Statista. Number of apps available in leading app stores as of July 2015 [EB/OL]. [2016-01-08]. http: // www. statista, com/statistics/276623/number-of- apps-available-in-leading-app-stores/.
  • 3AdMob by Google. AdMob by the nubers [EB/OL]. [2016-01-20]. https://www, google, com/admob/.
  • 4Yueqian Zhang, Xiaopu Luo, Haoyang Yin. Dex- Hunter: Toward extracting hidden code from packed android applications[C]//Proceedings of the 2015 Eu- ropean Symposium on Research in Computer Security: Springer International Publishing. Vienna, Austria: IEEE, 2015 : 293-311.
  • 5Zhou W, Wang Z, Zhou Y, et al: Divilar: Diversif- ying intermediate language for anti-repackaging on an- droid platform. [C]// Proceedings of the 4th ACM conference on Data and application security and priva- cy. Washington DC,USA:ACM. 2014: 199-210.
  • 6J. Freke. Small, An Assembler/Disassembler for An- droid's dex Format [EB/OL].[2016-01-20]. https: //github. com/JesusFreke/smali. Obfuscator-llvm.
  • 7Obfuscator[EB/OL]. [2016-01-20].https://github, com/obfuscator llvm/obfuscator/tree/ llvm-3. 6.1.
  • 8张译恬,王纯.基于安卓系统JNI机制的SO库加固方案设计[J].电信技术,2014(10):90-93. 被引量:7

共引文献3

同被引文献50

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部