Structural analysis of packing schemes for extracting hidden codes in mobile malware
- Authors
- Lim, Jongsu; Yi, Jeong Hyun
- Issue Date
- 15-Sep-2016
- Publisher
- SPRINGER INTERNATIONAL PUBLISHING AG
- Keywords
- Repackaging attack; Android app security; Mobile code hiding
- Citation
- EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, pp.1 - 12
- Journal Title
- EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING
- Start Page
- 1
- End Page
- 12
- URI
- http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/7504
- DOI
- 10.1186/s13638-016-0720-3
- ISSN
- 1687-1499
- Abstract
- In the Internet of Things service environment where all things are connected, mobile devices will become an extremely important medium linking together things with built-in heterogeneous communication functions. If a mobile device is exposed to hacking in this context, a security threat arises where all things linked to the device become targets of cyber hacking; therefore, greater emphasis will be placed on the demand for swift mobile malware detection and countermeasures. Such mobile malware applies advanced code-hiding schemes to ensure that the part of the code that executes malicious behavior is not detected by an anti-virus software. In order to detect mobile malware, we must first conduct structural analysis of their code-hiding schemes. In this paper, we analyze the structure of the two representative Android-based code-hiding tools, Bangcle and DexProtector, and then introduce a method and procedure for extracting the hidden original code. We also present experimental results of applying these tools on sample malicious codes.
- Files in This Item
-
Go to Link
- Appears in
Collections - College of Information Technology > School of Software > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/7504)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.