A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps

作者: Stefano Berlato , Mariano Ceccato

DOI: 10.1016/J.JISA.2020.102463

关键词:

摘要: … For the first validation, we consider simple “Hello World” apps … apps are still vulnerable to low-effort reverse engineering. … , an app can ping the TCP port 27047, used by the Frida server …

参考文章(25)
Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, Dawn Song, Juxtapp: a scalable system for detecting code reuse among android applications international conference on detection of intrusions and malware and vulnerability assessment. pp. 62- 81 ,(2012) , 10.1007/978-3-642-37300-8_4
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning, Detecting repackaged smartphone applications in third-party android marketplaces Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12. pp. 317- 326 ,(2012) , 10.1145/2133601.2133640
Timothy Vidas, Nicolas Christin, Evading android runtime analysis via sandbox detection computer and communications security. pp. 447- 458 ,(2014) , 10.1145/2590296.2590325
Wu Zhou, Zhi Wang, Yajin Zhou, Xuxian Jiang, DIVILAR: diversifying intermediate language for anti-repackaging on android platform conference on data and application security and privacy. pp. 199- 210 ,(2014) , 10.1145/2557547.2557558
William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, Anmol N. Sheth, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones ACM Transactions on Computer Systems. ,vol. 32, pp. 5- ,(2014) , 10.1145/2619091
Rebecca Balebako, Lorrie Faith Cranor, Jialiu Lin, Jason I. Hong, Abigail Marsh, The Privacy and Security Behaviors of Smartphone App Developers Proceedings of Workshop on Usable Security (USEC). ,(2014) , 10.14722/USEC.2014.23
Yiming Jing, Ziming Zhao, Gail-Joon Ahn, Hongxin Hu, Morpheus: automatically generating heuristics to detect Android emulators annual computer security applications conference. pp. 216- 225 ,(2014) , 10.1145/2664243.2664250
Yuxue Piao, Jin-Hyuk Jung, Jeong Hyun Yi, Server-based code obfuscation scheme for APK tamper detection Security and Communication Networks. ,vol. 9, pp. 457- 467 ,(2016) , 10.1002/SEC.936
Li Li, Tegawendé F. Bissyandé, Damien Octeau, Jacques Klein, DroidRA: taming reflection to support whole-program analysis of Android apps international symposium on software testing and analysis. pp. 318- 329 ,(2016) , 10.1145/2931037.2931044