首页> 美国卫生研究院文献>Sensors (Basel Switzerland) >Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART
【2h】

Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART

机译:ART中基于字节码捕获的移动码防逆方案

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

As interest in Internet of Things environments rapidly increases throughout the IT convergence field, compatibility with mobile devices must be provided to enable personalized services. The security of mobile platforms and applications is critical because security vulnerabilities of mobile devices can be spread to all things in these environments. Android, the leading open mobile platform, has long used the Dalvik virtual machine as its runtime system. However, it has recently been completely replaced by a new runtime system, namely Android Runtime (ART). The change from Android’s Dalvik to ART means that the existing Dalvik bytecode-based application execution structure has been changed to a machine code-based application execution structure. Consequently, a detailed understanding of ART, such as new file formats and execution switching methods between codes, is required from the viewpoint of application security. In this paper, we demonstrate that an existing Dalvik-based application vulnerability can be exploited as-is in ART. This is because existing Dalvik executable files coexist in the ART executable file, and these Dalvik bytecodes and compiled machine codes have one-to-one mapping relationships. We then propose an ART-based application protection scheme to secure this by dynamically eliminating the one-to-one mapping. In addition, the proposed scheme is implemented to evaluate its reverse engineering resistance and performance through experiments.
机译:随着整个IT融合领域对物联网环境的兴趣迅速增加,必须提供与移动设备的兼容性以实现个性化服务。移动平台和应用程序的安全性至关重要,因为移动设备的安全漏洞可以传播到这些环境中的所有事物。领先的开放式移动平台Android长期以来一直将 Dalvik 虚拟机用作其运行时系统。但是,最近它已被新的运行时系统完全取代,即Android Runtime( ART )。从Android的 Dalvik 更改为 ART 意味着现有的 Dalvik 基于字节码的应用程序执行结构已更改为基于机器码的应用程序执行结构体。因此,从应用程序安全性的角度出发,需要详细了解 ART ,例如新文件格式和代码之间的执行切换方法。在本文中,我们证明了可以在 ART 中按原样利用现有的 Dalvik 应用程序漏洞。这是因为现有的 Dalvik 可执行文件共存于 ART 可执行文件中,并且这些 Dalvik 字节码和已编译的机器码具有一对一的映射关系。关系。然后,我们提出一种基于 ART 的应用程序保护方案,以通过动态消除一对一映射来保护这一点。此外,所提出的方案被实施以通过实验评估其反向工程阻力和性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号