Detailed Information

Cited 10 time in webofscience Cited 17 time in scopus
Metadata Downloads

Security Assessment of Code Obfuscation Based on Dynamic Monitoring in Android Things

Full metadata record
DC Field Value Language
dc.contributor.authorCho, Taejoo-
dc.contributor.authorKim, Hyunki-
dc.contributor.authorYi, Jeong Hyun-
dc.date.available2018-05-09T02:09:01Z-
dc.date.created2018-04-17-
dc.date.issued2017-04-
dc.identifier.issn2169-3536-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/7398-
dc.description.abstractAndroid-based Internet-of-Things devices with excellent compatibility and openness are constantly emerging. A typical example is Android Things that Google supports. Compatibility based on the same platform can provide more convenient personalization services centering on mobile devices, while this uniformity-based computing environment can expose many security vulnerabilities. For example, new mobile malware running on Android can instantly transition to all connected devices. In particular, the Android platform has a structural weakness that makes it easy to repackage applications. This can lead to malicious behavior. To protect mobile apps that are vulnerable to malicious activity, various code obfuscation techniques are applied to key logic. The most effective one of this kind involves safely concealing application programming interfaces (API). It is very important to ensure that obfuscation is applied to the appropriate API with an adequate degree of resistance to reverse engineering. Because there is no objective evaluation method, it depends on the developer judgment. Therefore, in this paper, we propose a scheme that can quantitatively evaluate the level of hiding of APIs, which represent the function of the Android application based on machine learning theory. To perform the quantitative evaluation, the API information is obtained by static analysis of a DEX file, and the API-called code executed in Dalvik in the Android platform is dynamically extracted. Moreover, the sensitive APIs are classified using the extracted API and Naive Bayes classification. The proposed scheme yields a high score according to the level of hiding of the classified API. We tested the proposed scheme on representative applications of the Google Play Store. We believe it can be used as a model for obfuscation assessment schemes, because it can evaluate the level of obfuscation in general without relying on specific obfuscation tools.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.relation.isPartOfIEEE ACCESS-
dc.titleSecurity Assessment of Code Obfuscation Based on Dynamic Monitoring in Android Things-
dc.typeArticle-
dc.identifier.doi10.1109/ACCESS.2017.2693388-
dc.type.rimsART-
dc.identifier.bibliographicCitationIEEE ACCESS, v.5, pp.6361 - 6371-
dc.description.journalClass1-
dc.identifier.wosid000401431300109-
dc.identifier.scopusid2-s2.0-85028087687-
dc.citation.endPage6371-
dc.citation.startPage6361-
dc.citation.titleIEEE ACCESS-
dc.citation.volume5-
dc.contributor.affiliatedAuthorYi, Jeong Hyun-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.oadoiVersionpublished-
dc.subject.keywordAuthorAndroid Things-
dc.subject.keywordAuthormobile security-
dc.subject.keywordAuthorsecurity assessment-
dc.description.journalRegisteredClassscie-
Files in This Item
Go to Link
Appears in
Collections
College of Information Technology > School of Software > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher YI, JEONG HYUN photo

YI, JEONG HYUN
College of Information Technology (School of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE