본문 바로가기
  • Home

A Technique for Protecting Android Applications using Executable Code Encryption and Integrity Verification

  • Journal of Software Assessment and Valuation
  • Abbr : JSAV
  • 2014, 10(1), pp.19-26
  • Publisher : Korea Software Assessment and Valuation Society
  • Research Area : Engineering > Computer Science
  • Received : June 20, 2014
  • Accepted : June 28, 2014
  • Published : June 30, 2014

HyungJoon Shim 1 Sangwook Cho 1 Younsik Jeong 1 Chanhee Lee 1 Sangchul Han 2 SEONG JE CHO 1

1단국대학교
2단국대

ABSTRACT

In this paper, we propose a method for protecting Android applications against reverse engineering attacks. In this method, the server encrypts the original executable code (DEX) included in an APK file, inserts into the APK file a stub code that decrypts the encrypted DEX later at run-time, and distributes the modified APK file. The stub code includes an integrity validation code to detect attacks on itself. When a user installs and executes the APK file, the stub code verifies the integrity of itself, decrypts the encrypted DEX, and loads it dynamically to execute. Since the original DEX is distributed as an encrypted one, we can effectively protect the intellectual property. Further, by verifying the integrity of the stub code, we can prevent malicious users from bypassing our method. We applied the method to 15 Android apps, and evaluated its effectiveness. We confirmed that 13 out of them operates normally.

Citation status

* References for papers published after 2023 are currently being built.