Uncovering self code modification in android

7Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Android has proved itself to be the defacto standard for smart phones. Today Android claims a major share of smart phones OS market. The increasing popularity of Android has attracted attention of developers from around the globe in a very short span of time. Concerns and resultantly techniques involving code protection were evolved. The techniques were focused to hide sensitive logic of important pieces of code. These techniques were also used by malicious code writers to hide the malicious functionality of their code. This paper will analyze the techniques being employed in Android applications for code obfuscation. In addition, one of obfuscation technique i.e. runtime code modification in Android would be analyzed in detail. The major part of the paper would focus on tools and techniques for extracting dex files from the memory and analyzing them in order to recover code which has been injected in application process during runtime and is actually being executed in the memory.

Cite

CITATION STYLE

APA

Nasim, F., Aslam, B., Ahmed, W., & Naeem, T. (2015). Uncovering self code modification in android. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9084, pp. 297–313). Springer Verlag. https://doi.org/10.1007/978-3-319-18681-8_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free