Research on Security Protection Mechanism of Android APP

被引:0
|
作者
Zhao, Shu-han [1 ]
Li, Yong-zhen [1 ]
Wang, Zhen-zhen [1 ]
Jin, Zhe-xue [1 ]
机构
[1] Yanbian Univ, Network & Informat Secur Lab, Yanji, Peoples R China
关键词
Security file; Gatekeeper mechanism; Server-based digital signature; Integrity verification; JNI technology;
D O I
10.1109/ICICSE61805.2024.10625666
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on the idea of a digital signature, an Android program protection scheme is proposed. First, check whether there is a security file when the program starts, download it from the server if there is no security file, and perform subsequent verification if there is; Secondly, the gatekeeper mechanism is used to determine whether the installation address of the software is from the specified server by asking, and if it is, the subsequent verification is made, and if it is not, the program is directly exited; Then, the signature authentication is performed based on the server, and the hash value in the security file is compared with the decrypted hash value. If the hash value is consistent, the file is not tampered with; Finally, the integrity of the file is verified, and the installation is allowed if every value in the security file is verified. The application protection method can identify the installation files from unknown sources and prevent the installation. The whole process adopts the method of JNI call, the application core code is placed in the Java layer, the digital signature mechanism and integrity verification are placed in the Native layer, and the Java layer is packaged into the.so library, the Java layer calls the.so library through the JNI, which can effectively prevent decompilation.
引用
收藏
页码:35 / 38
页数:4
相关论文
共 50 条
  • [31] DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery
    Feng, Weimiao
    Hu, Rui
    Zhou, Cong
    Yu, Lei
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 244 - 257
  • [32] Security Analysis and Protection Based on Smali Injection for Android Applications
    Xu, Junfeng
    Li, Shoupeng
    Zhang, Tao
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2014, PT I, 2014, 8630 : 577 - 586
  • [33] Instrumentation Based Dynamic Android Application Security Protection System
    Li, Ming
    Piao, Zhikang
    Wang, Yong
    PROCEEDINGS OF THE 3RD WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY (WARTIA 2017), 2017, 148 : 261 - 272
  • [34] A Security Sandbox Approach of Android Based on Hook Mechanism
    Jiang, Xin
    Liu, Mingzhe
    Yang, Kun
    Liu, Yanhua
    Wang, Ruili
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [35] Android Forensics Tools and Security Mechanism: Survey Paper
    Amer, Nisreen
    Al-Halabi, Yahia S.
    ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [36] Security analysis and evaluation for the usage of settings mechanism in android
    Lu Y.
    Ying L.
    Su P.
    Feng D.
    Jing E.
    Gu Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2248 - 2261
  • [37] SEALANT: A Detection and Visualization Tool for Inter-app Security Vulnerabilities in Android
    Lee, Youn Kyu
    Yoodee, Peera
    Shahbazian, Arman
    Daye Nam
    Medvidovic, Nenad
    PROCEEDINGS OF THE 2017 32ND IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE'17), 2017, : 883 - 888
  • [38] A comprehensive framework for inter-app ICC security analysis of Android apps
    Nirumand, Atefeh
    Zamani, Bahman
    Ladani, Behrouz Tork
    AUTOMATED SOFTWARE ENGINEERING, 2024, 31 (02)
  • [40] Are free Android app security analysis tools effective in detecting known vulnerabilities?
    Venkatesh-Prasad Ranganath
    Joydeep Mitra
    Empirical Software Engineering, 2020, 25 : 178 - 219