Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting

Mobile apps are booming with the expansion of mobile devices such as smartphones, tablet PCs, smartwatches, and IoT devices. As the capabilities of mobile apps and the types of personal information required to run apps have diversified, the need for increased security has grown. In particular, Andro...

Full description

Bibliographic Details
Main Authors: Sungtae Kim, Taeyong Park, Geochang Jeon, Jeong Hyun Yi
Format: Article
Language:English
Published: Hindawi Limited 2020-01-01
Series:Mobile Information Systems
Online Access:http://dx.doi.org/10.1155/2020/8813243
id doaj-9905f2cc88b54fa3bc9f51668a413245
record_format Article
spelling doaj-9905f2cc88b54fa3bc9f51668a4132452021-07-02T15:35:11ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2020-01-01202010.1155/2020/88132438813243Self-Controllable Mobile App Protection Scheme Based on Binary Code SplittingSungtae Kim0Taeyong Park1Geochang Jeon2Jeong Hyun Yi3School of Computer Science and Engineering, Soongsil University, Seoul 06978, Republic of KoreaSchool of Computer Science and Engineering, Soongsil University, Seoul 06978, Republic of KoreaSchool of Software, Soongsil University, Seoul 06978, Republic of KoreaSchool of Software, Soongsil University, Seoul 06978, Republic of KoreaMobile apps are booming with the expansion of mobile devices such as smartphones, tablet PCs, smartwatches, and IoT devices. As the capabilities of mobile apps and the types of personal information required to run apps have diversified, the need for increased security has grown. In particular, Android apps are vulnerable to repackaging attacks, so various code protection techniques such as obfuscation and packing have been applied. However, apps protected with these techniques can also be disabled with static and dynamic analyses. In recent years, instead of using such application level protection techniques, a number of approaches have been adopted to monitor the behavior of apps at the platform level. However, in these cases, not only incompatibility of system software due to platform modification, but also self-control functionality cannot be provided at the user level and is very inconvenient. Therefore, in this paper we propose an app protection scheme that can split a part of the app code, store it in a separate IoT device, and self-control the split code through the partial app. In the proposed scheme, the partial app is executed only when it matches the split code stored in the IoT device. It does not require complicated encryption techniques to protect the code like the existing schemes. It also provides solutions to the parameter dependency and register reallocation issues that must be considered when implementing the proposed code splitting scheme. Finally, we present and analyze the results of experimenting the proposed scheme on real devices.http://dx.doi.org/10.1155/2020/8813243
collection DOAJ
language English
format Article
sources DOAJ
author Sungtae Kim
Taeyong Park
Geochang Jeon
Jeong Hyun Yi
spellingShingle Sungtae Kim
Taeyong Park
Geochang Jeon
Jeong Hyun Yi
Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting
Mobile Information Systems
author_facet Sungtae Kim
Taeyong Park
Geochang Jeon
Jeong Hyun Yi
author_sort Sungtae Kim
title Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting
title_short Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting
title_full Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting
title_fullStr Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting
title_full_unstemmed Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting
title_sort self-controllable mobile app protection scheme based on binary code splitting
publisher Hindawi Limited
series Mobile Information Systems
issn 1574-017X
1875-905X
publishDate 2020-01-01
description Mobile apps are booming with the expansion of mobile devices such as smartphones, tablet PCs, smartwatches, and IoT devices. As the capabilities of mobile apps and the types of personal information required to run apps have diversified, the need for increased security has grown. In particular, Android apps are vulnerable to repackaging attacks, so various code protection techniques such as obfuscation and packing have been applied. However, apps protected with these techniques can also be disabled with static and dynamic analyses. In recent years, instead of using such application level protection techniques, a number of approaches have been adopted to monitor the behavior of apps at the platform level. However, in these cases, not only incompatibility of system software due to platform modification, but also self-control functionality cannot be provided at the user level and is very inconvenient. Therefore, in this paper we propose an app protection scheme that can split a part of the app code, store it in a separate IoT device, and self-control the split code through the partial app. In the proposed scheme, the partial app is executed only when it matches the split code stored in the IoT device. It does not require complicated encryption techniques to protect the code like the existing schemes. It also provides solutions to the parameter dependency and register reallocation issues that must be considered when implementing the proposed code splitting scheme. Finally, we present and analyze the results of experimenting the proposed scheme on real devices.
url http://dx.doi.org/10.1155/2020/8813243
work_keys_str_mv AT sungtaekim selfcontrollablemobileappprotectionschemebasedonbinarycodesplitting
AT taeyongpark selfcontrollablemobileappprotectionschemebasedonbinarycodesplitting
AT geochangjeon selfcontrollablemobileappprotectionschemebasedonbinarycodesplitting
AT jeonghyunyi selfcontrollablemobileappprotectionschemebasedonbinarycodesplitting
_version_ 1721327136331005952