Home > Research > Publications & Outputs > AppIS

Electronic data

  • ICPADS_2017_paper_160

    Rights statement: ©2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

    Accepted author manuscript, 1.85 MB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

AppIS: Protect Android Apps Against Runtime Repackaging Attacks

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

AppIS: Protect Android Apps Against Runtime Repackaging Attacks. / Song, Lina; Tang, Zhanyong; Li, Zhen et al.
2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2017. p. 25-32 (2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Song, L, Tang, Z, Li, Z, Gong, X, Chen, X, Fang, D & Wang, Z 2017, AppIS: Protect Android Apps Against Runtime Repackaging Attacks. in 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS). 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS), IEEE, pp. 25-32. https://doi.org/10.1109/ICPADS.2017.00015

APA

Song, L., Tang, Z., Li, Z., Gong, X., Chen, X., Fang, D., & Wang, Z. (2017). AppIS: Protect Android Apps Against Runtime Repackaging Attacks. In 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS) (pp. 25-32). (2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)). IEEE. https://doi.org/10.1109/ICPADS.2017.00015

Vancouver

Song L, Tang Z, Li Z, Gong X, Chen X, Fang D et al. AppIS: Protect Android Apps Against Runtime Repackaging Attacks. In 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS). IEEE. 2017. p. 25-32. (2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)). doi: 10.1109/ICPADS.2017.00015

Author

Song, Lina ; Tang, Zhanyong ; Li, Zhen et al. / AppIS : Protect Android Apps Against Runtime Repackaging Attacks. 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2017. pp. 25-32 (2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)).

Bibtex

@inproceedings{0ccdebf92d1e4de39ce189327e0f5eb2,
title = "AppIS: Protect Android Apps Against Runtime Repackaging Attacks",
abstract = "Apps repackaged through reverse engineering pose a significant security threat to the Android smart phone ecosystem. Previous solutions have mostly focused on the detection and identification of repackaged apps. Nevertheless, current app anti-repackaging services can only protect applications at a coarse level and have significant performance overhead. These approaches can neither meet the performance requirements of Android nor achieve fine-grained protection against cumulative attack at the same time. Specifically, these solutions rely on afix-structure detecting engine and then will execute the same path at different times, which lead to the whole protection performs poorly when faced with dynamic cumulative attack, which istypical in real-world attack.This paper introduces the AppIS, a reinforced antirepackaging immune system, that is robust to app-repackaging attack scenarios. Unlike past work, which mostly focuses on simple protection only from just one respect, our design exploits an interlocking guarding net with time diversity for the tamperproofing of Android applications. The intuition underlying our design is that a dynamic and static combining method can provide a multi-level protection for the codes, core algorithm and sensitive data. We analyze and classify the existing threats on Android platform and furthermore abstract then model the repackaging attack scenarios. We then adapt a random controller used by the dispatcher to randomly construct guarding net with different structure every time. We have built a prototype of our design using Java Native Interface cross-layer calling mechanism for performance requirement. Results from a deployment of AppIS on three kinds of popular apps demonstrate that the new design can prevent our apps from cumulative attack without extra performance cost.",
author = "Lina Song and Zhanyong Tang and Zhen Li and Xiaoqing Gong and Xiaojiang Chen and Dingyi Fang and Zheng Wang",
note = "{\textcopyright}2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.",
year = "2017",
month = dec,
day = "17",
doi = "10.1109/ICPADS.2017.00015",
language = "English",
series = "2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)",
publisher = "IEEE",
pages = "25--32",
booktitle = "2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)",

}

RIS

TY - GEN

T1 - AppIS

T2 - Protect Android Apps Against Runtime Repackaging Attacks

AU - Song, Lina

AU - Tang, Zhanyong

AU - Li, Zhen

AU - Gong, Xiaoqing

AU - Chen, Xiaojiang

AU - Fang, Dingyi

AU - Wang, Zheng

N1 - ©2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

PY - 2017/12/17

Y1 - 2017/12/17

N2 - Apps repackaged through reverse engineering pose a significant security threat to the Android smart phone ecosystem. Previous solutions have mostly focused on the detection and identification of repackaged apps. Nevertheless, current app anti-repackaging services can only protect applications at a coarse level and have significant performance overhead. These approaches can neither meet the performance requirements of Android nor achieve fine-grained protection against cumulative attack at the same time. Specifically, these solutions rely on afix-structure detecting engine and then will execute the same path at different times, which lead to the whole protection performs poorly when faced with dynamic cumulative attack, which istypical in real-world attack.This paper introduces the AppIS, a reinforced antirepackaging immune system, that is robust to app-repackaging attack scenarios. Unlike past work, which mostly focuses on simple protection only from just one respect, our design exploits an interlocking guarding net with time diversity for the tamperproofing of Android applications. The intuition underlying our design is that a dynamic and static combining method can provide a multi-level protection for the codes, core algorithm and sensitive data. We analyze and classify the existing threats on Android platform and furthermore abstract then model the repackaging attack scenarios. We then adapt a random controller used by the dispatcher to randomly construct guarding net with different structure every time. We have built a prototype of our design using Java Native Interface cross-layer calling mechanism for performance requirement. Results from a deployment of AppIS on three kinds of popular apps demonstrate that the new design can prevent our apps from cumulative attack without extra performance cost.

AB - Apps repackaged through reverse engineering pose a significant security threat to the Android smart phone ecosystem. Previous solutions have mostly focused on the detection and identification of repackaged apps. Nevertheless, current app anti-repackaging services can only protect applications at a coarse level and have significant performance overhead. These approaches can neither meet the performance requirements of Android nor achieve fine-grained protection against cumulative attack at the same time. Specifically, these solutions rely on afix-structure detecting engine and then will execute the same path at different times, which lead to the whole protection performs poorly when faced with dynamic cumulative attack, which istypical in real-world attack.This paper introduces the AppIS, a reinforced antirepackaging immune system, that is robust to app-repackaging attack scenarios. Unlike past work, which mostly focuses on simple protection only from just one respect, our design exploits an interlocking guarding net with time diversity for the tamperproofing of Android applications. The intuition underlying our design is that a dynamic and static combining method can provide a multi-level protection for the codes, core algorithm and sensitive data. We analyze and classify the existing threats on Android platform and furthermore abstract then model the repackaging attack scenarios. We then adapt a random controller used by the dispatcher to randomly construct guarding net with different structure every time. We have built a prototype of our design using Java Native Interface cross-layer calling mechanism for performance requirement. Results from a deployment of AppIS on three kinds of popular apps demonstrate that the new design can prevent our apps from cumulative attack without extra performance cost.

U2 - 10.1109/ICPADS.2017.00015

DO - 10.1109/ICPADS.2017.00015

M3 - Conference contribution/Paper

T3 - 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)

SP - 25

EP - 32

BT - 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)

PB - IEEE

ER -