Android Methods Hooking Detection Using Dalvik Code and Dynamic Reverse Engineering by Stack Trace Analysis

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This research paper is focused on the issue of method hooking detection which in most of the existing solutions is focused on detection of the framework itself without checking of its real usage. The Authors proposed an algorithm that compares Dalvik bytecode from the application file with the stack trace of the executed code. Detection of the flow which is not a part of the app can be application method hooking. In this paper, the Authors ty to confirm it the concept can be used as a practical solution for the detection of this dynamic application tampering.

Cite

CITATION STYLE

APA

Szczepanik, M., Kędziora, M., & Jóźwiak, I. (2020). Android Methods Hooking Detection Using Dalvik Code and Dynamic Reverse Engineering by Stack Trace Analysis. In Advances in Intelligent Systems and Computing (Vol. 1173 AISC, pp. 633–641). Springer. https://doi.org/10.1007/978-3-030-48256-5_62

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free