Android App Copy Protection Mechanism with Semi-trusted Loader

被引:1
|
作者
Tsai, Kuo-Yu [1 ]
机构
[1] Chinese Culture Univ, Dept Appl Math, Taipei, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2018年 / 19卷 / 01期
关键词
Android App; Copy protection; Dynamic loading; Semi-trusted loader;
D O I
10.3966/160792642018011901006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an Android App copy protection mechanism with a semi-trusted loader. In the proposed mechanism, an Android App is composed of an APK (application package file) file and a JAR (Java archive) file. As a mobile device user wants to purchase an Android App from the market, he/she has to download the APK file from the market and installs the APK in his/her device. At the first execution time, the embedded semi-trusted loader will download the encrypted JAR file from the market, and the corresponding decryption key for the encrypted JAR file. Then, the semi-trusted loader decrypts the JAR file by using the decryption key, and further, executes the loading for all functionalities. After the loading, the semi-trusted loader will delete the decryption key and the JAR file, and then store the encrypted JAR file in the mobile device. After that, the semi-trusted loader only download the decryption key from the market as the mobile user wants to execute all functionalities of the App. We adopt the signature scheme to protect the embedded semi-trusted loader in our proposed mechanism. As the semi-trusted loader attempts to download the decryption key, the market verifies if the semi-trusted loader is modified by verifying the signature.
引用
收藏
页码:65 / 72
页数:8
相关论文
共 50 条
  • [1] Android App Copy Protection Mechanism with Semi-trusted Loader
    Tsai, Kuo-Yu
    [J]. 2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 464 - 467
  • [2] Android App Copy Protection Mechanism based on Dynamic Loading
    Tsai, Kuo-Yu
    Chiu, Yu-Hsuan
    Wu, Tzong-Chen
    [J]. 18TH IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS (ISCE 2014), 2014,
  • [3] Encryption over Semi-trusted Database
    Kadhem, Hasan
    Amagasa, Toshiyuki
    Kitagawa, Hiroyuki
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2009, 5667 : 358 - 362
  • [4] Adapting ATLAS@Home to trusted and semi-trusted resources
    Cameron, David
    Garonne, Vincent
    Millar, Paul
    Sun, Shaojun
    Wu, Wenjing
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2019), 2020, 245
  • [5] Research on Security Protection Mechanism of Android APP
    Zhao, Shu-han
    Li, Yong-zhen
    Wang, Zhen-zhen
    Jin, Zhe-xue
    [J]. 2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 35 - 38
  • [6] Fair Private Set Intersection with a Semi-trusted Arbiter
    Dong, Changyu
    Chen, Liqun
    Camenisch, Jan
    Russello, Giovanni
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 128 - 144
  • [7] Proxy signature scheme with a semi-trusted third party
    Liu Peiyu
    Cui Tao
    Xu Mingying
    [J]. CEIS 2011, 2011, 15
  • [8] Fair Threshold Decryption with Semi-Trusted Third Parties
    Hong, Jeongdae
    Kim, Jinil
    Kim, Jihye
    Franklin, Matthew K.
    Park, Kunsoo
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 309 - +
  • [9] A watermark protocol based on the semi-trusted third party
    Duan, F
    Zhou, YP
    Hu, Y
    [J]. ACTIVE MEDIA TECHNOLOGY, 2003, : 334 - 339
  • [10] Hierarchical Access Control Scheme Based on the Semi-Trusted Center
    Zhang Min-Qing
    Liu Yun-Hao
    Yang Xiao-Yuan
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 162 - 165