Abstract | ||
---|---|---|
Android has proved itself to be the defacto standard for smart phones. Today Android claims a major share of smart phones OS market. The increasing popularity of Android has attracted attention of developers from around the globe in a very short span of time. Concerns and resultantly techniques involving code protection were evolved. The techniques were focused to hide sensitive logic of important pieces of code. These techniques were also used by malicious code writers to hide the malicious functionality of their code. This paper will analyze the techniques being employed in Android applications for code obfuscation. In addition, one of obfuscation technique i.e. runtime code modification in Android would be analyzed in detail. The major part of the paper would focus on tools and techniques for extracting dex files from the memory and analyzing them in order to recover code which has been injected in application process during runtime and is actually being executed in the memory. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/978-3-319-18681-8_24 | CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015 |
Keywords | Field | DocType |
Android reverse engineering, Code modification, Obfuscation | De facto standard,World Wide Web,Android (operating system),Computer security,Computer science,Popularity,Obfuscation (software),Obfuscation | Conference |
Volume | ISSN | Citations |
9084 | 0302-9743 | 6 |
PageRank | References | Authors |
0.45 | 4 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Faisal Nasim | 1 | 6 | 0.45 |
Baber Aslam | 2 | 107 | 8.33 |
Waseem Ahmed | 3 | 36 | 5.16 |
Talha Naeem | 4 | 6 | 0.45 |