作者: Ning Zhang , Guangquan Xu , Guozhu Meng , Xi Zheng
DOI: 10.1007/978-3-030-05057-3_32
关键词:
摘要: Java code is easy to be decompiled, and third-party SO files are used frequently by developers improve development efficiency. Therefore, more core functions of Android applications implemented in the native layer. However, there neither comprehensive security research work nor automated analysis tools on layer, especially for that dynamically loaded within applications. To solve this problem, SoProtector, a novel effective system proposed defend against privacy leaks, which mainly analyzes data stream between two levels: application Native layers. In addition, SoProtector includes real-time monitor detect malicious binary code. Our evaluation using 3400 has demonstrated can sources, sinks smudges than most static tools; And it detects effectively blocks 82% load with low performance overhead.