Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Sungtae | - |
dc.contributor.author | Park, Taeyong | - |
dc.contributor.author | Jeon, Geochang | - |
dc.contributor.author | Yi, Jeong Hyun | - |
dc.date.available | 2020-11-18T04:40:13Z | - |
dc.date.created | 2020-11-18 | - |
dc.date.issued | 2020-10 | - |
dc.identifier.issn | 1574-017X | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/40007 | - |
dc.description.abstract | Mobile apps are booming with the expansion of mobile devices such as smartphones, tablet PCs, smartwatches, and IoT devices. As the capabilities of mobile apps and the types of personal information required to run apps have diversified, the need for increased security has grown. In particular, Android apps are vulnerable to repackaging attacks, so various code protection techniques such as obfuscation and packing have been applied. However, apps protected with these techniques can also be disabled with static and dynamic analyses. In recent years, instead of using such application level protection techniques, a number of approaches have been adopted to monitor the behavior of apps at the platform level. However, in these cases, not only incompatibility of system software due to platform modification, but also self-control functionality cannot be provided at the user level and is very inconvenient. Therefore, in this paper we propose an app protection scheme that can split a part of the app code, store it in a separate IoT device, and self-control the split code through the partial app. In the proposed scheme, the partial app is executed only when it matches the split code stored in the IoT device. It does not require complicated encryption techniques to protect the code like the existing schemes. It also provides solutions to the parameter dependency and register reallocation issues that must be considered when implementing the proposed code splitting scheme. Finally, we present and analyze the results of experimenting the proposed scheme on real devices. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | HINDAWI LTD | - |
dc.relation.isPartOf | MOBILE INFORMATION SYSTEMS | - |
dc.title | Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting | - |
dc.type | Article | - |
dc.identifier.doi | 10.1155/2020/8813243 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | MOBILE INFORMATION SYSTEMS, v.2020 | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000582191800001 | - |
dc.identifier.scopusid | 2-s2.0-85094881654 | - |
dc.citation.title | MOBILE INFORMATION SYSTEMS | - |
dc.citation.volume | 2020 | - |
dc.contributor.affiliatedAuthor | Yi, Jeong Hyun | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.