Reverse Engineering Android Apps With CodeInspect (invited paper)
نویسندگان
چکیده
While the Android operating system is popular among users, it has also attracted a broad variety of miscreants and malware. New samples are discovered every day. Purely automatic analysis is often not enough for understanding current state-of-the-art Android malware, though. Miscreants obfuscate and encrypt their code, or hide secrets in native code. Precisely identifying the malware’s behavior and finding information about its potential authors requires tools that assist human experts in a manual investigation. In this paper, we present CodeInspect, a novel reverse engineering tool for Android app that optimally supports investigators and analysts in that task.
منابع مشابه
Multiple Device Login Attacks and Countermeasures of Mobile VoIP Apps on Android
Because Android apps are structurally easy to decompile, attackers may, using reverse engineering, modify the source code or inject some code of his choice. If a mobile messenger app were to be attacked in the same nature, the attacker can bypass the authentication mechanism applied on the app to not only view past conversations and Time line records of a particular user but to also receive and...
متن کاملThings You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation
The prevalent usage of runtime packers has complicated Android malware analysis, as both legitimate and malicious apps are leveraging packing mechanisms to protect themselves against reverse engineer. Although recent efforts have been made to analyze particular packing techniques, little has been done to study the unique characteristics of Android packers. In this paper, we report the first sys...
متن کاملA Large Scale Investigation of Obfuscation Use in Google Play
Android applications are frequently plagiarized or maliciously repackaged, and soware obfuscation is a popular protection against these practices. In this study, we present the rst comprehensive analysis of the use and challenges of soware obfuscation in Android applications. We surveyed 308 Google Play developers about their experiences with obfuscation, nding that the free ProGuard sowar...
متن کاملCOVERT: Compositional Analysis of Android Inter-App Vulnerabilities
Android is the most popular platform for mobile devices. It facilitates sharing of data and services among applications using a rich inter-app communication system. While access to resources can be controlled by the Android permission system, enforcing permissions is not sufficient to prevent security violations, as permissions may be mismanaged, intentionally or unintentionally. Android’s enfo...
متن کاملUsing Dalvik Opcodes for Malware Detection on Android
Over the last few years, computers and smartphones have become essential tools in our ways of communicating with each-other. Nowadays, the amount of applications in the Google store has grown exponentially, therefore, malware developers have introduced malicious applications in that market. The Android system uses the Dalvik virtual machine. Through reverse engineering, we may be able to get th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016