Recommendable Schemes of Anti-decompilation for Android Applications

Currently, Regular Android software, injected in malicious code, is one of the important factors of that Android virus run rampant. Protecting the Android software has become a focus of attention in academia and industry. Addressing the safety protection issues of the Android software, this paper wi...

Full description

Saved in:
Bibliographic Details
Published inInternational Conference on Frontier of Computer Science and Technology (Print) pp. 184 - 190
Main Authors Junfeng Xu, Li Zhang, Dong Lin, Ye Mao
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.08.2015
Subjects
Online AccessGet full text
ISSN2159-6301
DOI10.1109/FCST.2015.76

Cover

Abstract Currently, Regular Android software, injected in malicious code, is one of the important factors of that Android virus run rampant. Protecting the Android software has become a focus of attention in academia and industry. Addressing the safety protection issues of the Android software, this paper will present some new schemes for Android software security technology. On the basis of existing research results, we will propose some recommendable solutions to prevent android applications being decompiled. Take advantage of these methods, we will build the Android software protection system, which will mostly eliminate the feasibility of the secondary packaging for Android software, and extend the Android software safety lifecycle.
AbstractList Currently, Regular Android software, injected in malicious code, is one of the important factors of that Android virus run rampant. Protecting the Android software has become a focus of attention in academia and industry. Addressing the safety protection issues of the Android software, this paper will present some new schemes for Android software security technology. On the basis of existing research results, we will propose some recommendable solutions to prevent android applications being decompiled. Take advantage of these methods, we will build the Android software protection system, which will mostly eliminate the feasibility of the secondary packaging for Android software, and extend the Android software safety lifecycle.
Author Ye Mao
Dong Lin
Li Zhang
Junfeng Xu
Author_xml – sequence: 1
  surname: Junfeng Xu
  fullname: Junfeng Xu
  email: Xujf@itsec.gov.cn
  organization: China Inf. Technol. Security Evaluation Center, Beijing, China
– sequence: 2
  surname: Li Zhang
  fullname: Li Zhang
  email: Zhangl@itsec.gov.cn
  organization: China Inf. Technol. Security Evaluation Center, Beijing, China
– sequence: 3
  surname: Dong Lin
  fullname: Dong Lin
  email: Lind@itsec.gov.cn
  organization: China Inf. Technol. Security Evaluation Center, Beijing, China
– sequence: 4
  surname: Ye Mao
  fullname: Ye Mao
  email: Maoy@itsec.gov.cn
  organization: China Inf. Technol. Security Evaluation Center, Beijing, China
BookMark eNotj0tLw0AURkeoYK3ZuXOTP5A4c-eVWYZqq1AQbF2XOzM3OJAXSTb-e626OnAOfPDdslU_9MTYveClENw97rbHUwlc6NKaK5Y5WwllrHTgNKzYGoR2hZFc3LBsnpPnYKzRXNk1e3qnMHQd9RF9S_kxfFJHcz40ed0vqYiXOqYWlzT0eTNMPzpOQ4p5PY5tCr9-vmPXDbYzZf_csI_d82n7Uhze9q_b-lAk4NVSaB_QNICCe6_R8CCddyZ4DGCD4CHyqEE5QoO6MtIoqQxYpaCJhKi93LCHv91EROdxSh1OX2crL2dBfgMVek0X
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/FCST.2015.76
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781467392952
1467392952
1467392944
9781467392945
EndPage 190
ExternalDocumentID 7314672
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
OCL
RIE
RIL
ID FETCH-LOGICAL-i208t-5bca6f2a10bb5a60c39b96cbac27c10cd0d5249ea6a58636434627442fdeaa5b3
IEDL.DBID RIE
ISSN 2159-6301
IngestDate Wed Aug 27 02:51:32 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i208t-5bca6f2a10bb5a60c39b96cbac27c10cd0d5249ea6a58636434627442fdeaa5b3
PageCount 7
ParticipantIDs ieee_primary_7314672
PublicationCentury 2000
PublicationDate 20150801
PublicationDateYYYYMMDD 2015-08-01
PublicationDate_xml – month: 08
  year: 2015
  text: 20150801
  day: 01
PublicationDecade 2010
PublicationTitle International Conference on Frontier of Computer Science and Technology (Print)
PublicationTitleAbbrev FCST
PublicationYear 2015
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib026765047
ssj0003177943
Score 1.6041657
Snippet Currently, Regular Android software, injected in malicious code, is one of the important factors of that Android virus run rampant. Protecting the Android...
SourceID ieee
SourceType Publisher
StartPage 184
SubjectTerms Androids
Encryption
Humanoid robots
Smart phones
Software
Title Recommendable Schemes of Anti-decompilation for Android Applications
URI https://ieeexplore.ieee.org/document/7314672
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1La8JAEF6sp57aoqVv9tBjN8bsK3sUW5GCpaCCN9lXIBQTaePFX9-dRK2UHnoJISGw2ZnsN5P9vhmEHhWXzNmEQ0MTTphVimhKw0HYVCpjKVegd568ifGcvS74ooWeDloY731NPvMRnNZ7-a60G_hV1pMUvuuw4J4EN2u0WnvfSYQMscYuNIZVOOCibEhzAdQUEcGRD7x31RsNpzPgdfEIio0c9VWpYWV0hib7ATVsko9oU5nIbn_VavzviM9R90fAh98P0HSBWr7ooGdINVfhAQdyKTwN5lr5L1xmeFBUOXFwd5033DgcYlkMZMcyd3hwtMndRfPRy2w4JrsmCiRP4rQi3FgtskT3Y2O4FrGlyihhjbaJtP3YutjxkIJ5LTRPBQ0BCoN2PCzJnNeaG3qJ2kVZ-CuEXUiuPGPKwMzGiVPe6jSDIk6aaWnENerADCzXTZ2M5e7lb_6-fItOwQANme4OtavPjb8PAF-Zh9qy3_Q5osg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEN4QPOhJDRjf7sGjLaX7aPdIUIIKxARIuJF9NWkMLdH24q93pwUkxoOXpmmzyXZnd7-Z7vfNIHQvWESNDhkUNGEe1UJ4khB34TqOhNKECdA7jyd8OKcvC7ZooIedFsZaW5HPrA-31Vm-yXUJv8o6EYF17TbcA4f7lNVqre3sCXnkvI2Ncwz7sEPGqKbNOVgTHndTecd8F51BfzoDZhfzId3IXmWVClgGx2i87VLNJ3n3y0L5-utXtsb_9vkEtX8kfPhtB06nqGGzFnqEYHPlGhgQTOGpM9jKfuI8wb2sSD0Db9dpzY7DzpvFQHfMU4N7e8fcbTQfPM36Q29TRsFLwyAuPKa05Ekou4FSTPJAE6EE10rqMNLdQJvAMBeEWcklizlxLgqFgjw0TIyVkilyhppZntlzhI0LryylQsHIBqERVss4gTROkspI8QvUghFYrutMGcvNx1_-_fgOHQ5n49Fy9Dx5vUJHYIyaWneNmsVHaW8c3BfqtrLyN64HphU
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Frontier+of+Computer+Science+and+Technology+%28Print%29&rft.atitle=Recommendable+Schemes+of+Anti-decompilation+for+Android+Applications&rft.au=Junfeng+Xu&rft.au=Li+Zhang&rft.au=Dong+Lin&rft.au=Ye+Mao&rft.date=2015-08-01&rft.pub=IEEE&rft.issn=2159-6301&rft.spage=184&rft.epage=190&rft_id=info:doi/10.1109%2FFCST.2015.76&rft.externalDocID=7314672
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2159-6301&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2159-6301&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2159-6301&client=summon