Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting
Mobile apps are booming with the expansion of mobile devices such as smartphones, tablet PCs, smartwatches, and IoT devices. As the capabilities of mobile apps and the types of personal information required to run apps have diversified, the need for increased security has grown. In particular, Andro...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2020-01-01
|
Series: | Mobile Information Systems |
Online Access: | http://dx.doi.org/10.1155/2020/8813243 |
id |
doaj-9905f2cc88b54fa3bc9f51668a413245 |
---|---|
record_format |
Article |
spelling |
doaj-9905f2cc88b54fa3bc9f51668a4132452021-07-02T15:35:11ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2020-01-01202010.1155/2020/88132438813243Self-Controllable Mobile App Protection Scheme Based on Binary Code SplittingSungtae Kim0Taeyong Park1Geochang Jeon2Jeong Hyun Yi3School of Computer Science and Engineering, Soongsil University, Seoul 06978, Republic of KoreaSchool of Computer Science and Engineering, Soongsil University, Seoul 06978, Republic of KoreaSchool of Software, Soongsil University, Seoul 06978, Republic of KoreaSchool of Software, Soongsil University, Seoul 06978, Republic of KoreaMobile apps are booming with the expansion of mobile devices such as smartphones, tablet PCs, smartwatches, and IoT devices. As the capabilities of mobile apps and the types of personal information required to run apps have diversified, the need for increased security has grown. In particular, Android apps are vulnerable to repackaging attacks, so various code protection techniques such as obfuscation and packing have been applied. However, apps protected with these techniques can also be disabled with static and dynamic analyses. In recent years, instead of using such application level protection techniques, a number of approaches have been adopted to monitor the behavior of apps at the platform level. However, in these cases, not only incompatibility of system software due to platform modification, but also self-control functionality cannot be provided at the user level and is very inconvenient. Therefore, in this paper we propose an app protection scheme that can split a part of the app code, store it in a separate IoT device, and self-control the split code through the partial app. In the proposed scheme, the partial app is executed only when it matches the split code stored in the IoT device. It does not require complicated encryption techniques to protect the code like the existing schemes. It also provides solutions to the parameter dependency and register reallocation issues that must be considered when implementing the proposed code splitting scheme. Finally, we present and analyze the results of experimenting the proposed scheme on real devices.http://dx.doi.org/10.1155/2020/8813243 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sungtae Kim Taeyong Park Geochang Jeon Jeong Hyun Yi |
spellingShingle |
Sungtae Kim Taeyong Park Geochang Jeon Jeong Hyun Yi Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting Mobile Information Systems |
author_facet |
Sungtae Kim Taeyong Park Geochang Jeon Jeong Hyun Yi |
author_sort |
Sungtae Kim |
title |
Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting |
title_short |
Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting |
title_full |
Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting |
title_fullStr |
Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting |
title_full_unstemmed |
Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting |
title_sort |
self-controllable mobile app protection scheme based on binary code splitting |
publisher |
Hindawi Limited |
series |
Mobile Information Systems |
issn |
1574-017X 1875-905X |
publishDate |
2020-01-01 |
description |
Mobile apps are booming with the expansion of mobile devices such as smartphones, tablet PCs, smartwatches, and IoT devices. As the capabilities of mobile apps and the types of personal information required to run apps have diversified, the need for increased security has grown. In particular, Android apps are vulnerable to repackaging attacks, so various code protection techniques such as obfuscation and packing have been applied. However, apps protected with these techniques can also be disabled with static and dynamic analyses. In recent years, instead of using such application level protection techniques, a number of approaches have been adopted to monitor the behavior of apps at the platform level. However, in these cases, not only incompatibility of system software due to platform modification, but also self-control functionality cannot be provided at the user level and is very inconvenient. Therefore, in this paper we propose an app protection scheme that can split a part of the app code, store it in a separate IoT device, and self-control the split code through the partial app. In the proposed scheme, the partial app is executed only when it matches the split code stored in the IoT device. It does not require complicated encryption techniques to protect the code like the existing schemes. It also provides solutions to the parameter dependency and register reallocation issues that must be considered when implementing the proposed code splitting scheme. Finally, we present and analyze the results of experimenting the proposed scheme on real devices. |
url |
http://dx.doi.org/10.1155/2020/8813243 |
work_keys_str_mv |
AT sungtaekim selfcontrollablemobileappprotectionschemebasedonbinarycodesplitting AT taeyongpark selfcontrollablemobileappprotectionschemebasedonbinarycodesplitting AT geochangjeon selfcontrollablemobileappprotectionschemebasedonbinarycodesplitting AT jeonghyunyi selfcontrollablemobileappprotectionschemebasedonbinarycodesplitting |
_version_ |
1721327136331005952 |