Recommendable Schemes of Anti-decompilation for Android Applications

Currently, Regular Android software, injected in malicious code, is one of the important factors of that Android virus run rampant. Protecting the Android software has become a focus of attention in academia and industry. Addressing the safety protection issues of the Android software, this paper will present some new schemes for Android software security technology. On the basis of existing research results, we will propose some recommendable solutions to prevent android applications being decompiled. Take advantage of these methods, we will build the Android software protection system, which will mostly eliminate the feasibility of the secondary packaging for Android software, and extend the Android software safety lifecycle.

[1]  Sébastien Salva,et al.  Data vulnerability detection by security testing for Android applications , 2013, 2013 Information Security for South Africa.

[2]  Patrick D. McDaniel,et al.  Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.

[3]  Xiapu Luo,et al.  RootGuard: Protecting Rooted Android Phones , 2014, Computer.

[4]  Helen J. Wang,et al.  Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.

[5]  Steve Hanna,et al.  Android permissions demystified , 2011, CCS '11.

[6]  Richard Bloss,et al.  Unmanned vehicles while becoming smaller and smarter are addressing new applications in medical, agriculture, in addition to military and security , 2014, Ind. Robot.

[7]  Karl Andersson,et al.  Reputation Based Security Model for Android Applications , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[8]  Shashi Shekhar,et al.  QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.

[9]  Tao Zhang,et al.  Security Analysis and Protection Based on Smali Injection for Android Applications , 2014, ICA3PP.

[10]  Shunxiang Wu,et al.  Phones' private data protection and synchronization based on Android OS , 2013, 2013 IEEE 4th International Conference on Software Engineering and Service Science.

[11]  Connie M. Borror,et al.  Robustness of the Markov-chain model for cyber-attack detection , 2004, IEEE Transactions on Reliability.

[12]  Ana R. Cavalli,et al.  Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems , 2014, 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion.

[13]  Ki-Cheol Son,et al.  The method of android application speed up by using NDK , 2011, 2011 3rd International Conference on Awareness Science and Technology (iCAST).

[14]  Yang Chen,et al.  A hidden Markov model detection of malicious Android applications at runtime , 2014, 2014 23rd Wireless and Optical Communication Conference (WOCC).

[15]  Swarat Chaudhuri,et al.  A Study of Android Application Security , 2011, USENIX Security Symposium.

[16]  Jianye Liu,et al.  Research on Development of Android Applications , 2011, 2011 4th International Conference on Intelligent Networks and Intelligent Systems.

[17]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[18]  T. Y. Chen,et al.  Dynamic program dicing , 1993, 1993 Conference on Software Maintenance.

[19]  Somesh Jha,et al.  Retargeting Android applications to Java bytecode , 2012, SIGSOFT FSE.

[20]  Tianzhou Chen,et al.  The Android Application Development College Challenge , 2012, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems.

[21]  Juanru Li,et al.  Android App Protection via Interpretation Obfuscation , 2014, 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing.

[22]  Patrick D. McDaniel,et al.  On lightweight mobile phone application certification , 2009, CCS.