Title
Uncovering Self Code Modification In Android
Abstract
Android has proved itself to be the defacto standard for smart phones. Today Android claims a major share of smart phones OS market. The increasing popularity of Android has attracted attention of developers from around the globe in a very short span of time. Concerns and resultantly techniques involving code protection were evolved. The techniques were focused to hide sensitive logic of important pieces of code. These techniques were also used by malicious code writers to hide the malicious functionality of their code. This paper will analyze the techniques being employed in Android applications for code obfuscation. In addition, one of obfuscation technique i.e. runtime code modification in Android would be analyzed in detail. The major part of the paper would focus on tools and techniques for extracting dex files from the memory and analyzing them in order to recover code which has been injected in application process during runtime and is actually being executed in the memory.
Year
DOI
Venue
2015
10.1007/978-3-319-18681-8_24
CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015
Keywords
Field
DocType
Android reverse engineering, Code modification, Obfuscation
De facto standard,World Wide Web,Android (operating system),Computer security,Computer science,Popularity,Obfuscation (software),Obfuscation
Conference
Volume
ISSN
Citations 
9084
0302-9743
6
PageRank 
References 
Authors
0.45
4
4
Name
Order
Citations
PageRank
Faisal Nasim160.45
Baber Aslam21078.33
Waseem Ahmed3365.16
Talha Naeem460.45