作者: Yueqian Zhang , Xiapu Luo , Haoyang Yin
DOI: 10.1007/978-3-319-24177-7_15
关键词: Virtual machine 、 Machine code 、 Hacker 、 Operating system 、 Computer science 、 Data mining 、 Android (operating system) 、 Launch Time 、 Executable
摘要: The rapid growth of mobile application (or simply app) economy provides lucrative and profitable targets for hackers. Among OWASP’s top ten risks 2014, the lack binary protections makes it easy to reverse, modify, repackage Android apps. Recently, a number packing services have been proposed protect apps by hiding original executable file (i.e., dex file). However, little is known about their effectiveness efficiency. In this paper, we perform first systematic investigation on such answering two questions: (1) what are major techniques used these effects apps? (2) can in packed app be recovered? If yes, how? We not only reveal evaluate effects, but also propose develop novel system, named DexHunter, extract files protected services. It worth noting that DexHunter supports both Dalvik virtual machine (DVM) new Runtime (ART). experimental results show from effectively efficiently.