An Effective Android Software Reinforcement Scheme Based on Online Key

Android is currently the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc. By deploying anti-debugging technology on Android applications, this paper designs and implements a reinforcement scheme for Android software with comprehensive utilization of encryption, dynamic loading and shell technologies. Evaluated the performance on different aspects, the proposed scheme can work effectively for android software protection.

[1]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[2]  Tilo Müller,et al.  Dynamic Self-Protection and Tamperproofing for Android Apps Using Native Code , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[3]  Julian Schütte,et al.  ConDroid: Targeted Dynamic Analysis of Android Applications , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.

[4]  John C. S. Lui,et al.  DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[5]  Ross J. Anderson,et al.  Aurasium: Practical Policy Enforcement for Android Applications , 2012, USENIX Security Symposium.

[6]  Dong Lin,et al.  Recommendable Schemes of Anti-decompilation for Android Applications , 2015, 2015 Ninth International Conference on Frontier of Computer Science and Technology.

[7]  Juanru Li,et al.  Android App Protection via Interpretation Obfuscation , 2014, 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing.

[8]  Heng Yin,et al.  DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.

[9]  Yajin Zhou,et al.  Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.