Protecting Android Native Code Based on Instruction Virtualization

被引:0
|
作者
Zhang Xiaohan [1 ]
Zhang Yuan [1 ]
Chi Xinjian [1 ]
Yang Min [1 ]
机构
[1] Fudan Univ, Sch Comp Sci, Shanghai 201203, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
Android security; Software protection; Android packer; Instruction virtualization;
D O I
10.11999/JEIT191036
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Android system is now increasingly used in different kinds of smart devices, such as smart phones, smart watches, smart TVs and smart cars. Unfortunately, reverse attacks against Android applications are also emerging, which not only violates the intellectual right of application developers, but also brings security risks to end users. Existing Android application protection methods such as naming obfuscation, dynamic loading, and code hiding can protect Java code and native (C/C++) code, but are relatively simple and easy to be bypassed. A more promising method is to use instruction virtualization, but previous binary-based methods target specific architecture (x86), and cannot be applied to protect Android devices with different architectures. An architecture-independent instruction virtualization method is proposed, a prototype named Virtual Machine Packing Protection (VMPP) to protect Android native code is designed and implemented. VMPP includes a register-based fix-length instruction set, an interpreter to execute virtualized instructions, and a set of toolchains for developers to use to protect their code. VMPP is tested on a large number of C/C++ code and realworld Android applications. The results show that VMPP can effectively protect the security of Android native code for different architectures with low overhead.
引用
收藏
页码:2108 / 2116
页数:9
相关论文
共 16 条
  • [1] [杜春来 Du Chunlai], 2017, [信息网络安全, Netinfo Security], P22
  • [2] Falsina L., 2015, Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015, ACSAC'15, P201
  • [3] HU Hengwei, 2018, THESIS
  • [4] Transmission Power Control with the Guaranteed Communication Reliability in WSN
    Kim, Dae-Young
    Jin, Zilong
    Choi, Jungwook
    Lee, Ben
    Cho, Jinsung
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [5] Kim Nak Young, 2016, J INTERNET SERV INF, V6, P54
  • [6] Li Z, 2019, THESIS
  • [7] Malware Sandbox Evasion Detection Based on Code Evolution
    Liang Guanghui
    Pang Jianmin
    Shan Zheng
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (02) : 341 - 347
  • [8] MeiMei Huo, 2014, Applied Mechanics and Materials, V644-650, P2740, DOI 10.4028/www.scientific.net/AMM.644-650.2740
  • [9] Symbolic Deobfuscation: From Virtualized Code Back to the Original
    Salwan, Jonathan
    Bardin, Sebastien
    Potet, Marie-Laure
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2018, 2018, 10885 : 372 - 392
  • [10] Security Internet Center, 2019, INV REP PIR ANDR MOB