期刊文献+

Android APP加固方案的研究 被引量:2

Research on the Reinforcement Scheme for Android Apps
下载PDF
导出
摘要 Android应用程序在未经任何加固处理的情况下极容易受到反编译攻击,存在较大的安全隐患。APP加固技术为应用程序提供了有效的防护措施,增加了反编译的难度,本文针对目前常用的反编译手段提出了一种APP加固方案,该方案首先针对需要保护的资源文件进行加密处理;然后针对DEX文件的反编译,采用混淆代码技术加固处理,针对二次打包,本文采用签名校验技术。实验表明,本文提出的加固方案能够有效地防患APK被反编译,加大了二次打包的难度。 Android applications without any reinforcement are extremely vulnerable to de-compilation attacks,with significant security risks.App reinforcement technology provides effective protection for applications and increases the difficulty of de-compilation.In this paper,an APP reinforcement scheme is proposed against the commonly used de-compilation methods.The scheme first encrypts the resource files to be protected;Then,for the DEX file recompilation,confusion code technology is used to reinforce the DEX file.For the secondary packaging,the signature verification technique is adopted in this paper.Experimental results show that the proposed reinforcement scheme can effectively prevent APK from being decompiled and thus increases the difficulty of secondary packaging.
作者 彭守镇 PENG Shouzhen(Guang Dong Polytechnic College,Zhaoqing 526100,China)
出处 《软件工程》 2019年第6期8-12,共5页 Software Engineering
基金 广东省教育厅大学生创新创业项目(项目编号:201713720011) 广东理工学院大学生创新创业项目(项目编号:CXCY2017045)
关键词 APP反编译 DEX加固 加壳保护 二次打包 App de-compilation DEX reinforcement shell protection secondary packing
  • 相关文献

参考文献6

二级参考文献31

  • 1杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 2La Polla M, Martinelli F, Sgandurra D. A survey on security for mobile devices [ J ]. IEEE Communications Surveys & Tutorials, 2012, 15(1): 446-471.
  • 3Grace M, Zhou Y J, Zhang Q, et al. RiskRanker: scalable and accurate zero-day Android malware detection [ C ] // Proceedings of the lOth International Conference on Mobile Systems, Applications, and Services (MobiSys' 12 ). Low Wood Bay, Lake District, UK. 2012 : 281- 294.
  • 4Rastogi V, Chen Y, Jiang X X. DroidChameleon: evaluating Android anti-malware against transformation attacks [ C ]// Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. Hangzhou, China; ACM. 2013 : 329- 334.
  • 5Zhou W, Zhang X W, Jiang X X. AppInk: watermarking android apps for repackaging deterrence [ C ]////Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. Hangzhou, China; ACM. 2013: 1-12.
  • 6Zhou Y J, Jiang X X. Detecting passive content leaks and pollution in android applications [ C ] // Proc of the 20th Annual Network and Distributed System Security Symposium (NDSS13). San Diego, California, USA. 2013 : 1- 16.
  • 7Suarez-Tangil G, Tapiador J E, Peris-Lopez P, et al. Dendroid: a text mining approach to analyzing and classifying code structures in Android malware families[J].Expert Systems with Applications, 2014, 41(4) : 1 104- 1 117.
  • 8Denning D E. A lattice model of secure information flow [ J]. Commun ACM, 1976, 19(5) : 236-243.
  • 9Tsai C R, Gligor V D, Chandersekaran C S. On the identification of covert storage channels in secure systems [ J]. Software Engineering, IEEE Transactions on, 1990, 16 (6) : 569-580.
  • 10管瑞霞,陆蓓.TFLD:一种中文文本关键词自动提取方法[J].机电工程,2010,27(9):123-126. 被引量:4

共引文献23

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部