2014
DOI: 10.1002/sec.936
|View full text |Cite
|
Sign up to set email alerts
|

Server‐based code obfuscation scheme for APK tamper detection

Abstract: It is easy to decompile Android applications (or apps) owing to the structural characteristics of the app building process, but this ease makes them quite vulnerable to forgery or modification attacks. In particular, users may suffer direct financial loss if this vulnerability is exploited in security-critical private and business applications, such as online banking. One of the solutions to these problems is a code obfuscation technique. In this regard, DexGuard, which is based on ProGuard, which is integrate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 8 publications
0
14
0
Order By: Relevance
“…4) It is recommended that the cloud server SP calculate the control parameters and send it to the recommendation requesting user k together with the output data and time stamp t in the algorithm (Hudson et al, 2016). The recommendation request user k receives the relevant data returned by the recommendation cloud server SP on the client, and decrypts the encrypted values obtained in the algorithm, namely X and Y, using their own homomorphic encryption private keys, and the decryption results are recorded as P and Q (Li & Sugimoto, 2018;Piao et al, 2016). For each application i to be recommended in the decryption set, the client calculates the recommendation value for the application i for the recommendation request user k obtained within the time window t according to formula ( 7):…”
Section: Interactive Recommendation Generationmentioning
confidence: 99%
“…4) It is recommended that the cloud server SP calculate the control parameters and send it to the recommendation requesting user k together with the output data and time stamp t in the algorithm (Hudson et al, 2016). The recommendation request user k receives the relevant data returned by the recommendation cloud server SP on the client, and decrypts the encrypted values obtained in the algorithm, namely X and Y, using their own homomorphic encryption private keys, and the decryption results are recorded as P and Q (Li & Sugimoto, 2018;Piao et al, 2016). For each application i to be recommended in the decryption set, the client calculates the recommendation value for the application i for the recommendation request user k obtained within the time window t according to formula ( 7):…”
Section: Interactive Recommendation Generationmentioning
confidence: 99%
“…However, in the Android application source code, to ensure the correct execution of the code, there are some code segments that can not be confused such as Android system components, native method, the method which needs to use Android serialization, enum, API, the content that resources file reference, the place where the reflection method is used, and the reference to a third-party library. In addition, code obfuscation does not cause large changes to the application code structure [27], so the statistical characteristics of the application code will not be greatly affected.…”
Section: Code Obfuscationmentioning
confidence: 99%
“…Code obfuscation [14] is a kind of program transformation that makes it difficult for attackers to read the program logic, thereby increasing the resistance to reverse engineering. There has been a lot of research on native code obfuscation in recent decades with the aim of protecting PE (Portable Executable) or ELF (Executable and Linkable Format) files.…”
Section: Code Obfuscationmentioning
confidence: 99%