共 1 条
Secure Repackage-Proofing Framework for Android Apps Using Collatz Conjecture
被引:2
|作者:
Ma, Haoyu
[1
,2
]
Li, Shijia
[3
,4
]
Gao, Debin
[1
]
Jia, Chunfu
[3
,4
]
机构:
[1] Singapore Management Univ, Sch Comp & Informat Syst, Singapore 188065, Singapore
[2] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
[3] Nankai Univ, Coll Cyber Sci, Tianjin 300071, Peoples R China
[4] Nankai Univ, Tianjin Key Lab Network & Data Secur Technol, Tianjin 300071, Peoples R China
基金:
国家重点研发计划;
中国国家自然科学基金;
新加坡国家研究基金会;
关键词:
Payloads;
Smart phones;
Measurement;
Runtime;
Communication channels;
Weapons;
Manipulator dynamics;
App repackaging;
repackage-proofing;
code obfuscation;
collatz conjecture;
D O I:
10.1109/TDSC.2021.3091654
中图分类号:
TP3 [计算技术、计算机技术];
学科分类号:
0812 ;
摘要:
App repackaging has been raising serious concerns about the health of the Android ecosystem, and repackage-proofing is an important mitigation against threat of such attacks. However, existing app repackage-proofing schemes were only evaluated against trivial adversaries simulated using analyzers for other purposes (e.g., disclosing privacy leakage vulnerabilities), hence were shown "effective" mainly because their key programming features were not even supported by those toolkits. Furthermore, existing works have also neglected dynamic adversaries capable of manipulating victim apps at runtime, making them vulnerable against such stronger opponents. In this article, we propose a novel repackage-proofing framework, which deploys distributed detection and response sites into the subject app's native partition to cross-verify all its code files. The detection sites transmit obtained integrity metrics to response sites via secure communication channels built on the subject app's own control flows using a specialized obfuscation technique based on Collatz conjecture, turning the repackage-proofing process into complicated implicit flows that are intrinsically difficult to be resolved due to the conjecture's nonlinear dynamical behaviors. We evaluated our framework using sophisticated Android data-flow analyzers. Results showed that our prototype effectively impeded analyses aiming to trace the information flows of its cross-verification.
引用
收藏
页码:3271 / 3285
页数:15
相关论文