You Shall not Repackage! Demystifying Anti-Repackaging on Android

被引:17
|
作者
Merlo, Alessio [1 ]
Ruggia, Antonio [1 ]
Sciolla, Luigi [1 ]
Verderame, Luca [1 ]
机构
[1] Univ Genoa, DIBRIS, Via Dodecaneso,35, I-16146 Genoa, Italy
关键词
Android security; App security; Anti-repackaging techniques; Attacks to anti-repackaging; Anti-tampering; APPS;
D O I
10.1016/j.cose.2021.102181
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
App repackaging refers to the practice of customizing an existing mobile app and redistributing it in the wild. In this way, the attacker aims to force some mobile users to install the repackaged (likely malicious) app instead of the original one. This phenomenon strongly affects Android, where apps are available on public stores, and the only requirement for an app to execute properly is to be digitally signed. Anti-repackaging techniques try counteracting this attack by adding logical controls in the app at compile-time. Such controls activate in case of repackaging and lead the repackaged app to fail at runtime. On the other side, the attacker must detect and bypass the controls to repackage safely. The high-availability of working repackaged apps in the Android ecosystem suggests that the attacker's side is winning. In this respect, this paper aims to bring out the main issues of the current anti-repackaging approaches. The contribution of the paper is three-fold: 1) analyze the weaknesses of the current state-of-the-art anti-repackaging schemes (i.e., Self-Protection through Dex Encryption, AppIS, SSN, SDC, BombDroid, and NRP), 2) summarize the main attack vectors to anti repackaging techniques composing those schemes, and 3) show how such attack vectors allow circumventing the current proposals. The paper will also show a full-fledged attack to NRP, the only publicly-available anti-repackaging tool to date. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:25
相关论文
共 8 条
  • [1] Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization
    Ruggia, Antonio
    Losiouk, Eleonora
    Verderame, Luca
    Conti, Mauro
    Merlo, Alessio
    37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, : 970 - 981
  • [2] PARIOT: Anti-repackaging for IoT firmware integrity
    Verderame, Luca
    Ruggia, Antonio
    Merlo, Alessio
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 217
  • [3] ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection
    Merlo, Alessio
    Ruggia, Antonio
    Sciolla, Luigi
    Verderame, Luca
    PERVASIVE AND MOBILE COMPUTING, 2021, 76
  • [4] Android App Anti-repackage方法研究综述
    吴家顺
    高静
    科技展望, 2015, 25 (25) : 13 - 13
  • [5] You can't touch this: Consumer-centric android application repackaging detection
    Gurulian, Iakovos
    Markantonakis, Konstantinos
    Cavallaro, Lorenzo
    Mayes, Keith
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 65 : 1 - 9
  • [6] Reprint of “You can't touch this: Consumer-centric android application repackaging detection”
    Gurulian I.
    Markantonakis K.
    Cavallaro L.
    Mayes K.
    Future Generation Computer Systems, 2018, 80 : 537 - 545
  • [7] Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
    Rastogi, Vaibhav
    Chen, Yan
    Jiang, Xuxian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (01) : 99 - 108
  • [8] You can't touch this: Consumer-centric android application repackaging detection (Reprinted from Future Generation Computer Systems vol 65, pg 1-9, 2016)
    Gurulian, Iakovos
    Markantonakis, Konstantinos
    Cavallaro, Lorenzo
    Mayes, Keith
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 537 - 545