期刊文献+

基于Smali-Java关键代码修复的Android程序逆向分析方法

Android program reverse analysis method based on Smali-Java key code repair
原文传递
导出
摘要 目前Android程序取证主要是采用逆向分析方法,但是在将APK程序转换为Java源代码的过程中,部分核心代码因结构复杂,无法转换为正确的Java源程序。针对这一问题,提出一种基于Smali-Java关键代码修复的Android程序逆向分析方法,这种方法通过人工分析方式,根据Smali源代码完成受损Java程序的修复。通过大量实际测试,证明该方法可以较好地应用于案件的检验鉴定工作。 Studying the forensic identification method of Android programs and locking the location information of criminal suspects has practical significance to crack down on the illegal and criminal activities of Android malicious programs.At present,the Android program forensics mainly uses the reverse analysis method,but in the process of converting the APK program into Java source code,part of the core code cannot be converted into the correct Java source code due to the complicated structure.In order to resolve this problem,this paper proposes a reverse analysis method of Android program based on Smali-Java key code repair.This method completes the repair of damaged Java code according to Smali source code through manual analysis.Through a large number of tests,it is proved that this method can be applied to the inspection and identification of cases.
作者 徐国天 张明星 XU Guo-tian;ZHANG Ming-xing(Cyber Crime Investigation Department,Criminal Investigation Police University of China,Liaoning Shenyang 110035;Xinluo Public Security Branch of Longyan Public Security Bureau,Fujian Longyan 364000)
出处 《中国刑警学院学报》 2019年第3期113-119,共7页 Journal of Criminal Investigation Police University of China
基金 中央高校基本科研业务费项目(编号:3242017013) 辽宁省自然科学基金课题(编号:20180550841) 辽宁省自然科学基金课题(编号:2015020091) 公安部理论及软科学研究计划课题(编号:2016LLYJXJXY013) 公安部技术研究计划课题(编号:2016JSYJB06) 辽宁省经济社会发展研究重大课题(编号:2018LSLKTZD-028) 辽宁省社会科学规划基金项目(编号:L16BFX012)
关键词 Smali JAVA ANDROID 逆向分析修复 Smali Java Android Reverse analysis repair
  • 相关文献

参考文献4

二级参考文献44

  • 1胡兆阳,谢余强,舒辉.Windows下堆内存管理机制研究[J].计算机工程与应用,2005,41(17):59-61. 被引量:6
  • 2DEFENSE SIENCE BOARD. Report of the Defense Science Board Task Force on High Performance Microchip Supply [R]. Washington DC: Defense Science Board, Feb 2005.
  • 3LIEBERMAN J. White Paper: National Security Aspects of the Global Migration of the U.S. Semiconductor Industry[R]. Airland Subcommittee, US Senate Armed Services Committee, June 2003.
  • 4ADEE S. The Hunt for the Kill Switch [J]. IEEE Spectrum, 2008, 45(5): 34-39.
  • 5MUTSCHLER A S. SEMI:Semi Equipment Industry Stands to Lose up to $4B Annually due to IP Infringements[J]. Electronic News, 2008,54 ( 18 ) :17-22.
  • 6DEAN COLLINS.Trust in Integrated Circuits and 3rd Party IP[C]//IEEE. International Workshop on Hardware-Oriented Trust Security,2008, Anaheim, CA. New York:IEEE. 2008:19-30.
  • 7AGRAWAL D, BAKTIR S, KARAKOYUNLU D, et al. Trojan Detection Using IC Fingerprinting[C]//IEEE. Symposium on Security and Privacy, 2007, Berkeley, California. New York: IEEE, 2007:296- 310.
  • 8ABRAMOVICI M, BRADLEY P. Integrated Circuit Security New Threats and Solutions[C]//ACM. 5th Annual Workshop on Cyber Security Information Intellengence Research,2009. Oak Ridge,USA. New York:ACM, 2009:25-27.
  • 9CHAKRABORTY R S. Hardware Trojan: Threats and Emerging Solutions[C//IEEE. International High Level Design Validation Test Workshop,2009, San Francisco, CA. New York:IEEE, 2009:166- 171.
  • 10LIN L, BURLESON W, PARR C. MOLES: Malicious Off-Chip Leakage Enabled by Side-Channels[C]//IEEE. International Conference on Computer-Aided Design, 2009, San Jose, CA. New York: IEEE, 2009:117-122.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部