An Anti-Piracy Method Based on Encryption and Dynamic Loading for Android Applications

Article Preview

Abstract:

App pirate remains a serious threat to the emerging mobile app ecosystem, especially in the Android Market. In this paper, we propose an anti-piracy method based on encryption and dynamic loading for Android applications. The basic idea of the method is to separate dex file from the original apk file and encrypt it, then hidden the dex file into resource, finally use a shell dex file to replace the original dex file. When apk is installed, the shell dex file begins to run and release the oringinal dex file and dynamic loading into memory. Once loaded success, shell code start the original apk activity through startActivity. Android app developers can use this method to protect their apps and the method is simple and convenient.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2740-2743

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Android Open Source Project. Android sources. Visited: May, 2012. [Online]. Available: http: /source. android. com.

Google Scholar

[2] Code Protection in Android , Patrick Schulz, June 7, 2012. https: /net. cs. uni-bonn. de/fileadmin/user_upload/plohmann/2012-Schulz-Code_Protection_in_Android. pdf.

Google Scholar

[3] Manjunath, Vibha. Reverse Engineering of Malware on Android", 2011, http: /docs. google. com/views, a=v&q=cache: rm7krxkeygsJ: www. sans. org/reading_room/whitepapers/pda/reverse-engineering-malware-android 33769+research].

Google Scholar

[4] C. A. Castillo and Mobile Security Working Group McAfee, \Android malware past, present, and future, " (2011).

Google Scholar

[5] Joonhyouk Jang, Cheol Jeon Jinman Jung Bongjae Kim Jiyeon Park Yookun Cho Robust Static Software Watermarking Scheme for Copyright Protection of Mobile Software. School of Computer Science and Engineering, Seoul National University.

DOI: 10.1049/cp.2013.2196

Google Scholar

[6] Sung Ryul Kim, Jun Ho Noh, Yang Chan Moon, AH Ryum Kim, Design and Implementation of Cryptography-based Copy Protection System for Android Apps, Dept. Internet Media Engineering, Konkuk University.

Google Scholar

[7] Eungyu Lee, Yeongung Park, Kanghee Kim, Seongje Cho, A Mobile Application Anti-Piracy Technique Using Mandatory Access Control, School of Electronic Engineering, Soongsil University, Dept. Computer Science, Dankook University.

Google Scholar

[8] Yoon-sik Jeong, Jea-Chan Moon, Dong-Jin Kim, Seong-Je Cho, Minku Park, Preventing Illegal Execution of android App based on Encryption under Mobile Network Environment, Dept. Computer Science, Dankook University, Dept. Computer Engineering, Konkuk University.

Google Scholar

[9] Sung Ryul Kim, Ji Hyun Kim, Hee Sun Kim, A Hybrid Design of Online Execution Class and Encryption-based Copyright Protection for Android Apps. Dept. Internet-Media Engineering, Konkuk University.

DOI: 10.1145/2401603.2401678

Google Scholar

[10] Android, A. P. K. http: /developer. android. com/guide/market/expansion-files. html.

Google Scholar

[11] Miecznikowski, J., & Hendren, L. (2002). Decompiling java bytecode: Problems, traps and pitfalls. In: R. Nigel Horspool (Ed. ), Compiler construction, (p.153–184). Berlin: Springer.

DOI: 10.1007/3-540-45937-5_10

Google Scholar

[12] An Assembler(smali) and disassembler(baksmali) for androids dex format. http: /code. google. com/p/smali.

Google Scholar

[13] Brutall. http: /code. google. com/p/android-apktool.

Google Scholar

[14] Panxiaobo. http: /code. google. com/p/dex2jar.

Google Scholar

[15] William Enck, Peter Gilbert, Byung-Gon Chun, Landon P Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, pages 1–6, (2010).

DOI: 10.1145/2619091

Google Scholar

[16] Emmanuel Dupuy. http: /java. decompiler. free. fr/?q=jdgui.

Google Scholar