Recommendable Schemes of Anti-decompilation for Android Applications
Currently, Regular Android software, injected in malicious code, is one of the important factors of that Android virus run rampant. Protecting the Android software has become a focus of attention in academia and industry. Addressing the safety protection issues of the Android software, this paper wi...
Saved in:
Published in | International Conference on Frontier of Computer Science and Technology (Print) pp. 184 - 190 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.08.2015
|
Subjects | |
Online Access | Get full text |
ISSN | 2159-6301 |
DOI | 10.1109/FCST.2015.76 |
Cover
Abstract | Currently, Regular Android software, injected in malicious code, is one of the important factors of that Android virus run rampant. Protecting the Android software has become a focus of attention in academia and industry. Addressing the safety protection issues of the Android software, this paper will present some new schemes for Android software security technology. On the basis of existing research results, we will propose some recommendable solutions to prevent android applications being decompiled. Take advantage of these methods, we will build the Android software protection system, which will mostly eliminate the feasibility of the secondary packaging for Android software, and extend the Android software safety lifecycle. |
---|---|
AbstractList | Currently, Regular Android software, injected in malicious code, is one of the important factors of that Android virus run rampant. Protecting the Android software has become a focus of attention in academia and industry. Addressing the safety protection issues of the Android software, this paper will present some new schemes for Android software security technology. On the basis of existing research results, we will propose some recommendable solutions to prevent android applications being decompiled. Take advantage of these methods, we will build the Android software protection system, which will mostly eliminate the feasibility of the secondary packaging for Android software, and extend the Android software safety lifecycle. |
Author | Ye Mao Dong Lin Li Zhang Junfeng Xu |
Author_xml | – sequence: 1 surname: Junfeng Xu fullname: Junfeng Xu email: Xujf@itsec.gov.cn organization: China Inf. Technol. Security Evaluation Center, Beijing, China – sequence: 2 surname: Li Zhang fullname: Li Zhang email: Zhangl@itsec.gov.cn organization: China Inf. Technol. Security Evaluation Center, Beijing, China – sequence: 3 surname: Dong Lin fullname: Dong Lin email: Lind@itsec.gov.cn organization: China Inf. Technol. Security Evaluation Center, Beijing, China – sequence: 4 surname: Ye Mao fullname: Ye Mao email: Maoy@itsec.gov.cn organization: China Inf. Technol. Security Evaluation Center, Beijing, China |
BookMark | eNotj0tLw0AURkeoYK3ZuXOTP5A4c-eVWYZqq1AQbF2XOzM3OJAXSTb-e626OnAOfPDdslU_9MTYveClENw97rbHUwlc6NKaK5Y5WwllrHTgNKzYGoR2hZFc3LBsnpPnYKzRXNk1e3qnMHQd9RF9S_kxfFJHcz40ed0vqYiXOqYWlzT0eTNMPzpOQ4p5PY5tCr9-vmPXDbYzZf_csI_d82n7Uhze9q_b-lAk4NVSaB_QNICCe6_R8CCddyZ4DGCD4CHyqEE5QoO6MtIoqQxYpaCJhKi93LCHv91EROdxSh1OX2crL2dBfgMVek0X |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/FCST.2015.76 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781467392952 1467392952 1467392944 9781467392945 |
EndPage | 190 |
ExternalDocumentID | 7314672 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL |
ID | FETCH-LOGICAL-i208t-5bca6f2a10bb5a60c39b96cbac27c10cd0d5249ea6a58636434627442fdeaa5b3 |
IEDL.DBID | RIE |
ISSN | 2159-6301 |
IngestDate | Wed Aug 27 02:51:32 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i208t-5bca6f2a10bb5a60c39b96cbac27c10cd0d5249ea6a58636434627442fdeaa5b3 |
PageCount | 7 |
ParticipantIDs | ieee_primary_7314672 |
PublicationCentury | 2000 |
PublicationDate | 20150801 |
PublicationDateYYYYMMDD | 2015-08-01 |
PublicationDate_xml | – month: 08 year: 2015 text: 20150801 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | International Conference on Frontier of Computer Science and Technology (Print) |
PublicationTitleAbbrev | FCST |
PublicationYear | 2015 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssib026765047 ssj0003177943 |
Score | 1.6041657 |
Snippet | Currently, Regular Android software, injected in malicious code, is one of the important factors of that Android virus run rampant. Protecting the Android... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 184 |
SubjectTerms | Androids Encryption Humanoid robots Smart phones Software |
Title | Recommendable Schemes of Anti-decompilation for Android Applications |
URI | https://ieeexplore.ieee.org/document/7314672 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1La8JAEF6sp57aoqVv9tBjN8bsK3sUW5GCpaCCN9lXIBQTaePFX9-dRK2UHnoJISGw2ZnsN5P9vhmEHhWXzNmEQ0MTTphVimhKw0HYVCpjKVegd568ifGcvS74ooWeDloY731NPvMRnNZ7-a60G_hV1pMUvuuw4J4EN2u0WnvfSYQMscYuNIZVOOCibEhzAdQUEcGRD7x31RsNpzPgdfEIio0c9VWpYWV0hib7ATVsko9oU5nIbn_VavzviM9R90fAh98P0HSBWr7ooGdINVfhAQdyKTwN5lr5L1xmeFBUOXFwd5033DgcYlkMZMcyd3hwtMndRfPRy2w4JrsmCiRP4rQi3FgtskT3Y2O4FrGlyihhjbaJtP3YutjxkIJ5LTRPBQ0BCoN2PCzJnNeaG3qJ2kVZ-CuEXUiuPGPKwMzGiVPe6jSDIk6aaWnENerADCzXTZ2M5e7lb_6-fItOwQANme4OtavPjb8PAF-Zh9qy3_Q5osg |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEN4QPOhJDRjf7sGjLaX7aPdIUIIKxARIuJF9NWkMLdH24q93pwUkxoOXpmmzyXZnd7-Z7vfNIHQvWESNDhkUNGEe1UJ4khB34TqOhNKECdA7jyd8OKcvC7ZooIedFsZaW5HPrA-31Vm-yXUJv8o6EYF17TbcA4f7lNVqre3sCXnkvI2Ncwz7sEPGqKbNOVgTHndTecd8F51BfzoDZhfzId3IXmWVClgGx2i87VLNJ3n3y0L5-utXtsb_9vkEtX8kfPhtB06nqGGzFnqEYHPlGhgQTOGpM9jKfuI8wb2sSD0Db9dpzY7DzpvFQHfMU4N7e8fcbTQfPM36Q29TRsFLwyAuPKa05Ekou4FSTPJAE6EE10rqMNLdQJvAMBeEWcklizlxLgqFgjw0TIyVkilyhppZntlzhI0LryylQsHIBqERVss4gTROkspI8QvUghFYrutMGcvNx1_-_fgOHQ5n49Fy9Dx5vUJHYIyaWneNmsVHaW8c3BfqtrLyN64HphU |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Frontier+of+Computer+Science+and+Technology+%28Print%29&rft.atitle=Recommendable+Schemes+of+Anti-decompilation+for+Android+Applications&rft.au=Junfeng+Xu&rft.au=Li+Zhang&rft.au=Dong+Lin&rft.au=Ye+Mao&rft.date=2015-08-01&rft.pub=IEEE&rft.issn=2159-6301&rft.spage=184&rft.epage=190&rft_id=info:doi/10.1109%2FFCST.2015.76&rft.externalDocID=7314672 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2159-6301&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2159-6301&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2159-6301&client=summon |