Open Access Open Access  Restricted Access Subscription or Fee Access

Securing Android Application with Anti- Reversing Techniques

Sudipta Ghosh, Kamlesh Lahre, S.R. Tandan

Abstract


In this growing market of smart phones, Android is an open source platform of Google that has become one of the most popular operating system. As a result, protecting applications running on Android becomes of interest. Currently, Reverse engineering of Android applications is much easier than on other architectures, due to the high level but simple byte code language used. Hence, the goal is to minimize and manage risks of software flaws. Anti-Reverse engineering techniques can be used to prevent reverse engineering. This paper discusses the possible code obfuscation techniques and process exploitation techniques on the android platform. Our approach aims at increasing the complexity of the control flow of the application so that it becomes tough for a reverse engineer to get the business logic performed by an android application.

Keywords


Android, Anti-Reverse Engineering, Code Obfuscation, Reverse Engineering.

Full Text:

PDF

References


Patrick Schulz “ Code Protection in Android ” 2012-Schulz-Code_ Protection_ in_Android.pdf .

Manjunath,Vibha “ Reverse Engineering Of Malware On Android”(2011).[https://docs.google.com/viewer?a=v&q=cache:rm7KrxkEYgsJ:www.sans.org/reading_room/whitepapers/pda/reverse-engineering-malware-android_33769+research].

Kundu, Deepti, "JShield: A Java Anti-Reversing Tool" (2011).Master's Projects. Paper 161.

Android Open Source Project. Android sources. Visited: May,2012. [Online]. Available: http://source.android.com

Venkatesan, Ashwini, "Code Obfuscation and Virus Detection" (2008).Master's Projects.

G. Nolan, (2004). Decompiling Java. Chapter 4 – Protecting Your Source: Strategies for Defeating Decompilers, pages 79 – 210. New York, USA: Springer-Verlag New York.

“Code Obfuscation against Static and Dynamic Reverse Engineering” Sebastian Schrittwieser and Stefan Katzenbeisser.

android-apktool project [Online]. Available at: http://code.google.com/p/android-apktool/ (July 2011).

smali project [Online]. Available at: http://code.google.com/p/smali/ (July 2011).

C. Collberg., D. Low. & C. Thomborson (1997). A Taxonomy of Obfuscating Transformations. Technical Report. Department of Computer Science, University of Auckland, New Zealand. Retrieved October21, 2010 from http://www.cs.arizona.edu/~collberg/Research/Publications/CollbergThomborson.

ProGuard [Online].Available at: http://proguard.sourceforge.net/.

Gartner. Worldwide smartphone sales soared in fourth quarter of 2011 with 47 percent growth.Visited:May,2012. [Online].Available:http:www.gartner.com/it/page.jsp?id=1924314.

http://www.codeproject.com/Articles/207464/Exception-Handling-in-Visual-Cplusplus.

http://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide#UnhandledExceptionFilter.

http://msdn.microsoft.com/en-us/library/windows/desktop/ms681401(v=vs.85).aspx.




DOI: http://dx.doi.org/10.36039/AA072013004

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.