Detailed Information

Cited 1 time in webofscience Cited 2 time in scopus
Metadata Downloads

Mobile application tamper detection scheme using dynamic code injection against repackaging attacks

Full metadata record
DC Field Value Language
dc.contributor.authorCHO, HAEHYUN-
dc.contributor.authorBang, Jiwoong-
dc.contributor.authorJi, Myeongju-
dc.contributor.authorYi, Jeong Hyun-
dc.date.available2018-05-09T02:25:38Z-
dc.date.created2018-04-17-
dc.date.issued2016-09-
dc.identifier.issn0920-8542-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/7512-
dc.description.abstractThe Android platform, with a large market share from its inclusive openness, faces a big problem with repackaging attacks, because reverse engineering is made easy due to the signature method that allows self-sign and also due to application structure. A repackaging attack is a method of attack, where an attacker with malicious intent alters an application distributed on the market to then redistribute it. The attacker injects into the original application illegal advertisement or malicious code that extracts personal information, and then redistributes the app. To protect against such repackaging attacks, obfuscation methods and tampering detection schemes to prevent application analysis are being developed and applied to Android applications. However, through dynamic analysis, protection methods at the managed code can be rendered ineffective, and there is a need for a protection method that will address this. In this paper, we show that, using Dalvik monitor, protection methods at the managed code level can be dynamically analyzed. In addition, to prevent a tampered application from running, we propose a tampering detection scheme that uses a dynamic attestation platform. It consist of two phases; (1) detection code injection: inject tamper detecting code into an application and (2) code attestation: attest the injected code on the platform. The proposed scheme first uses the tamper detection method at the platform level to inspect execution codes executed in real time and to fundamentally intercept repackaged applications.-
dc.language영어-
dc.language.isoen-
dc.publisherSPRINGER-
dc.relation.isPartOfJOURNAL OF SUPERCOMPUTING-
dc.titleMobile application tamper detection scheme using dynamic code injection against repackaging attacks-
dc.typeArticle-
dc.identifier.doi10.1007/s11227-016-1763-2-
dc.type.rimsART-
dc.identifier.bibliographicCitationJOURNAL OF SUPERCOMPUTING, v.72, no.9, pp.3629 - 3645-
dc.description.journalClass1-
dc.identifier.wosid000382094500023-
dc.identifier.scopusid2-s2.0-84983507478-
dc.citation.endPage3645-
dc.citation.number9-
dc.citation.startPage3629-
dc.citation.titleJOURNAL OF SUPERCOMPUTING-
dc.citation.volume72-
dc.contributor.affiliatedAuthorCHO, HAEHYUN-
dc.contributor.affiliatedAuthorYi, Jeong Hyun-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.subject.keywordAuthorAndroid application protection-
dc.subject.keywordAuthorTamper detection-
dc.subject.keywordAuthorAndroid platform-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Software > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher CHO, HAEHYUN photo

CHO, HAEHYUN
College of Information Technology (School of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE