2021
DOI: 10.1016/j.cose.2021.102181
|View full text |Cite
|
Sign up to set email alerts
|

You Shall not Repackage! Demystifying Anti-Repackaging on Android

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
4
4
1

Relationship

3
6

Authors

Journals

citations
Cited by 23 publications
(29 citation statements)
references
References 25 publications
0
29
0
Order By: Relevance
“…The remaining 508 apps (i.e., 11.3%) were not tracked by HideDroid due to the failure of the repackaging phase. This is mainly related to the presence of antirepackaging protections [32], [33] that block HideDroid from injecting the network configuration and re-install the AUT. Furthermore, we also evaluated the compatibility of HideDroid for the leading analytics services during the experimental phase.…”
Section: Testing Hidedroid In the Wildmentioning
confidence: 99%
“…The remaining 508 apps (i.e., 11.3%) were not tracked by HideDroid due to the failure of the repackaging phase. This is mainly related to the presence of antirepackaging protections [32], [33] that block HideDroid from injecting the network configuration and re-install the AUT. Furthermore, we also evaluated the compatibility of HideDroid for the leading analytics services during the experimental phase.…”
Section: Testing Hidedroid In the Wildmentioning
confidence: 99%
“…Merlo et al [34] leverage native code for performing app integrity checks. Merlo et al [35] look at current anti-repackaging techniques and how to circumvent them.…”
Section: Device and App Integritymentioning
confidence: 99%
“…1). The idea of detection nodes has been put forward in [6] and it refers to a self-protecting mechanism made by a piece of code inserted into the original , which carries out integrity checks -called anti-tampering controls (e.g., signature check, package name check) -when executed at runtime [11]. More specifically, anti-tampering checks compare the signature of a specific part of the with a value pre-computed during the building of the original app;…”
Section: Anti-repackaging Techniquesmentioning
confidence: 99%
“…ARMAND supports several controls in either Java and native code, such as environment controls (e.g., emulator detection), signature check, package name check, and file integrity check (e.g., resource and image files). We refer the interested reader to [11] for a detailed description of the different AT techniques that can be used in an anti-repackaging scheme.…”
Section: Multi-patterning Logic Bombs and At Checksmentioning
confidence: 99%