Research on Security Protection Mechanism of Android APP

被引:0
|
作者
Zhao, Shu-han [1 ]
Li, Yong-zhen [1 ]
Wang, Zhen-zhen [1 ]
Jin, Zhe-xue [1 ]
机构
[1] Yanbian Univ, Network & Informat Secur Lab, Yanji, Peoples R China
关键词
Security file; Gatekeeper mechanism; Server-based digital signature; Integrity verification; JNI technology;
D O I
10.1109/ICICSE61805.2024.10625666
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on the idea of a digital signature, an Android program protection scheme is proposed. First, check whether there is a security file when the program starts, download it from the server if there is no security file, and perform subsequent verification if there is; Secondly, the gatekeeper mechanism is used to determine whether the installation address of the software is from the specified server by asking, and if it is, the subsequent verification is made, and if it is not, the program is directly exited; Then, the signature authentication is performed based on the server, and the hash value in the security file is compared with the decrypted hash value. If the hash value is consistent, the file is not tampered with; Finally, the integrity of the file is verified, and the installation is allowed if every value in the security file is verified. The application protection method can identify the installation files from unknown sources and prevent the installation. The whole process adopts the method of JNI call, the application core code is placed in the Java layer, the digital signature mechanism and integrity verification are placed in the Native layer, and the Java layer is packaged into the.so library, the Java layer calls the.so library through the JNI, which can effectively prevent decompilation.
引用
收藏
页码:35 / 38
页数:4
相关论文
共 50 条
  • [41] Parallel Space Traveling: A Security Analysis of App-Level Virtualization in Android
    Dai, Deshun
    Li, Ruixuan
    Tang, Junwei
    Davanian, Ali
    Yin, Heng
    SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 25 - 32
  • [42] Assessing the security of inter-app communications in android through reinforcement learning
    Romdhana, Andrea
    Merlo, Alessio
    Ceccato, Mariano
    Tonella, Paolo
    COMPUTERS & SECURITY, 2023, 131
  • [43] Are free Android app security analysis tools effective in detecting known vulnerabilities?
    Ranganath, Venkatesh-Prasad
    Mitra, Joydeep
    EMPIRICAL SOFTWARE ENGINEERING, 2020, 25 (01) : 178 - 219
  • [44] Research on Data Security of Mobile Payment App
    Shan Meijing
    SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 1201 - 1204
  • [45] Multi-OS isolation security mechanism for Android platforms
    Zhang, Zhijiao
    Chen, Yu
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2014, 54 (12): : 1517 - 1521
  • [46] Automated Repair of Information Flow Security in Android Implicit Inter-App Communication
    Tiwari, Abhishek
    Prakash, Jyoti
    Dong, Zhen
    Furia, Carlo A.
    FORMAL METHODS, PT I, FM 2024, 2025, 14933 : 285 - 303
  • [47] The Excitation Controller Based on the Android System Record Download APP Research
    Guo, Yaoyao
    Xiong, Rao
    He, Mingxie
    PROCEEDINGS OF THE 2017 THE 5TH INTERNATIONAL CONFERENCE ON CONTROL, MECHATRONICS AND AUTOMATION (ICCMA 2017), 2017, : 82 - 85
  • [48] Research on Network Security Protection Strategy
    Ye Yalin
    Yan Lina
    Ren Shuai
    Zhang Qian
    2019 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS 2019), 2019, : 152 - 154
  • [49] Research on Computer Network Security and Protection
    Liang, Tiantian
    2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 29, 2014, 29 : 244 - 247
  • [50] Research on the protection strategy of network security
    Ji, Hong
    ADVANCED RESEARCH ON INFORMATION SCIENCE, AUTOMATION AND MATERIAL SYSTEMS III, 2013, 703 : 236 - 239