None Ilham, None Muhammad Niswar, None Ady Wahyudi Paundu
{"title":"基于Dex CRC和Blake2算法的签名验证防止Android应用的逆向工程攻击","authors":"None Ilham, None Muhammad Niswar, None Ady Wahyudi Paundu","doi":"10.3991/ijim.v17i19.42575","DOIUrl":null,"url":null,"abstract":"The rapid growth of Android applications has led to more cybercrime cases, specifically Reverse Engineering attacks, on Android apps. One of the most common cases of reverse engineering is application repackaging, where the application is downloaded via the Play Store or the official website and then repackaged with various additions or changes. One of the ways to avoid Application Repackaging attacks is to check the signature of an application. However, hackers can manipulate the application by adding a hook, i.e., replacing the original function for getting signatures with a new modified function in the application. In this research, the development of a verification method for Android applications is carried out by utilizing Dex CRC and the Blake2 algorithm, which will be written in C using the Java Native Interface (JNI). The results of this study indicate that the verification method using Dex CRC and the Blake2 algorithm can effectively protect Android applications from Application Repackaging attacks without burdening application performance.","PeriodicalId":53486,"journal":{"name":"International Journal of Interactive Mobile Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Signature Verification Based on Dex CRC and Blake2 Algorithm to Prevent Reverse Engineering Attack in Android Application\",\"authors\":\"None Ilham, None Muhammad Niswar, None Ady Wahyudi Paundu\",\"doi\":\"10.3991/ijim.v17i19.42575\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid growth of Android applications has led to more cybercrime cases, specifically Reverse Engineering attacks, on Android apps. One of the most common cases of reverse engineering is application repackaging, where the application is downloaded via the Play Store or the official website and then repackaged with various additions or changes. One of the ways to avoid Application Repackaging attacks is to check the signature of an application. However, hackers can manipulate the application by adding a hook, i.e., replacing the original function for getting signatures with a new modified function in the application. In this research, the development of a verification method for Android applications is carried out by utilizing Dex CRC and the Blake2 algorithm, which will be written in C using the Java Native Interface (JNI). The results of this study indicate that the verification method using Dex CRC and the Blake2 algorithm can effectively protect Android applications from Application Repackaging attacks without burdening application performance.\",\"PeriodicalId\":53486,\"journal\":{\"name\":\"International Journal of Interactive Mobile Technologies\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Interactive Mobile Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3991/ijim.v17i19.42575\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Interactive Mobile Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3991/ijim.v17i19.42575","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
Signature Verification Based on Dex CRC and Blake2 Algorithm to Prevent Reverse Engineering Attack in Android Application
The rapid growth of Android applications has led to more cybercrime cases, specifically Reverse Engineering attacks, on Android apps. One of the most common cases of reverse engineering is application repackaging, where the application is downloaded via the Play Store or the official website and then repackaged with various additions or changes. One of the ways to avoid Application Repackaging attacks is to check the signature of an application. However, hackers can manipulate the application by adding a hook, i.e., replacing the original function for getting signatures with a new modified function in the application. In this research, the development of a verification method for Android applications is carried out by utilizing Dex CRC and the Blake2 algorithm, which will be written in C using the Java Native Interface (JNI). The results of this study indicate that the verification method using Dex CRC and the Blake2 algorithm can effectively protect Android applications from Application Repackaging attacks without burdening application performance.
期刊介绍:
This interdisciplinary journal focuses on the exchange of relevant trends and research results and presents practical experiences gained while developing and testing elements of interactive mobile technologies. It bridges the gap between pure academic research journals and more practical publications. So it covers the full range from research, application development to experience reports and product descriptions. Fields of interest include, but are not limited to: -Future trends in m-technologies- Architectures and infrastructures for ubiquitous mobile systems- Services for mobile networks- Industrial Applications- Mobile Computing- Adaptive and Adaptable environments using mobile devices- Mobile Web and video Conferencing- M-learning applications- M-learning standards- Life-long m-learning- Mobile technology support for educator and student- Remote and virtual laboratories- Mobile measurement technologies- Multimedia and virtual environments- Wireless and Ad-hoc Networks- Smart Agent Technologies- Social Impact of Current and Next-generation Mobile Technologies- Facilitation of Mobile Learning- Cost-effectiveness- Real world experiences- Pilot projects, products and applications