Home > Research > Publications & Outputs > DexPro

Electronic data

  • DexPro

    Rights statement: The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-69471-9_27

    Accepted author manuscript, 1 MB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

View graph of relations

DexPro: A Bytecode Level Code Protection System for Android Applications

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

DexPro: A Bytecode Level Code Protection System for Android Applications. / Zhao, Beibei; Tang, Zhanyong; Li, Zhen et al.
Cyberspace Safety and Security. ed. / S. Wen; W. Wu; A. Castiglione. Cham: Springer, 2017. p. 367-382 (Lecture Notes in Computer Science; Vol. 10581).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Zhao, B, Tang, Z, Li, Z, Song, L, Gong, X, Fang, D, Liu, F & Wang, Z 2017, DexPro: A Bytecode Level Code Protection System for Android Applications. in S Wen, W Wu & A Castiglione (eds), Cyberspace Safety and Security. Lecture Notes in Computer Science, vol. 10581, Springer, Cham, pp. 367-382.

APA

Zhao, B., Tang, Z., Li, Z., Song, L., Gong, X., Fang, D., Liu, F., & Wang, Z. (2017). DexPro: A Bytecode Level Code Protection System for Android Applications. In S. Wen, W. Wu, & A. Castiglione (Eds.), Cyberspace Safety and Security (pp. 367-382). (Lecture Notes in Computer Science; Vol. 10581). Springer.

Vancouver

Zhao B, Tang Z, Li Z, Song L, Gong X, Fang D et al. DexPro: A Bytecode Level Code Protection System for Android Applications. In Wen S, Wu W, Castiglione A, editors, Cyberspace Safety and Security. Cham: Springer. 2017. p. 367-382. (Lecture Notes in Computer Science).

Author

Zhao, Beibei ; Tang, Zhanyong ; Li, Zhen et al. / DexPro : A Bytecode Level Code Protection System for Android Applications. Cyberspace Safety and Security. editor / S. Wen ; W. Wu ; A. Castiglione. Cham : Springer, 2017. pp. 367-382 (Lecture Notes in Computer Science).

Bibtex

@inproceedings{cb2d313ebf954b1a9a13ab931589afc9,
title = "DexPro: A Bytecode Level Code Protection System for Android Applications",
abstract = "Unauthorized code modification through reverse engineering is a major concern for Android application developers. Code reverse engineering is often used by adversaries to remove the copyright protection or advertisements from the app, or to inject malicious code into the program. By making the program difficult to analyze, code obfuscation is a potential solution to the problem. However, there is currently little work on applying code obfuscation to compiled Android bytecode. This paper presents DexPro, a novel bytecode level code obfuscation system for Android applications. Unlike prior approaches, our method performs on the Android Dex bytecode and does not require access to high-level program source or modification of the compiler or the VM. Our approach leverages the fact all except floating operands in Dex are stored in a 32-bit register to pack two 32-bit operands into a 64-bit operand. In this way, any attempt to decompile the bytecode will result in incorrect information. Meanwhile, our approach obfuscates the program control flow by inserting opaque predicates before the return instruction of a function call, which makes it harder for the attacker to trace calls to protected functions. Experimental results show that our approach can deter sophisticate reverse engineering and code analysis tools, and the overhead of runtime and memory footprint is comparable to existing code obfuscation methods.",
keywords = "Code obfuscation , Reverse engineering ",
author = "Beibei Zhao and Zhanyong Tang and Zhen Li and Lina Song and Xiaoqing Gong and Dingyi Fang and Fangyuan Liu and Zheng Wang",
note = "The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-69471-9_27",
year = "2017",
month = oct,
day = "21",
language = "English",
isbn = "9783319694702",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "367--382",
editor = "S. Wen and W. Wu and A. Castiglione",
booktitle = "Cyberspace Safety and Security",

}

RIS

TY - GEN

T1 - DexPro

T2 - A Bytecode Level Code Protection System for Android Applications

AU - Zhao, Beibei

AU - Tang, Zhanyong

AU - Li, Zhen

AU - Song, Lina

AU - Gong, Xiaoqing

AU - Fang, Dingyi

AU - Liu, Fangyuan

AU - Wang, Zheng

N1 - The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-69471-9_27

PY - 2017/10/21

Y1 - 2017/10/21

N2 - Unauthorized code modification through reverse engineering is a major concern for Android application developers. Code reverse engineering is often used by adversaries to remove the copyright protection or advertisements from the app, or to inject malicious code into the program. By making the program difficult to analyze, code obfuscation is a potential solution to the problem. However, there is currently little work on applying code obfuscation to compiled Android bytecode. This paper presents DexPro, a novel bytecode level code obfuscation system for Android applications. Unlike prior approaches, our method performs on the Android Dex bytecode and does not require access to high-level program source or modification of the compiler or the VM. Our approach leverages the fact all except floating operands in Dex are stored in a 32-bit register to pack two 32-bit operands into a 64-bit operand. In this way, any attempt to decompile the bytecode will result in incorrect information. Meanwhile, our approach obfuscates the program control flow by inserting opaque predicates before the return instruction of a function call, which makes it harder for the attacker to trace calls to protected functions. Experimental results show that our approach can deter sophisticate reverse engineering and code analysis tools, and the overhead of runtime and memory footprint is comparable to existing code obfuscation methods.

AB - Unauthorized code modification through reverse engineering is a major concern for Android application developers. Code reverse engineering is often used by adversaries to remove the copyright protection or advertisements from the app, or to inject malicious code into the program. By making the program difficult to analyze, code obfuscation is a potential solution to the problem. However, there is currently little work on applying code obfuscation to compiled Android bytecode. This paper presents DexPro, a novel bytecode level code obfuscation system for Android applications. Unlike prior approaches, our method performs on the Android Dex bytecode and does not require access to high-level program source or modification of the compiler or the VM. Our approach leverages the fact all except floating operands in Dex are stored in a 32-bit register to pack two 32-bit operands into a 64-bit operand. In this way, any attempt to decompile the bytecode will result in incorrect information. Meanwhile, our approach obfuscates the program control flow by inserting opaque predicates before the return instruction of a function call, which makes it harder for the attacker to trace calls to protected functions. Experimental results show that our approach can deter sophisticate reverse engineering and code analysis tools, and the overhead of runtime and memory footprint is comparable to existing code obfuscation methods.

KW - Code obfuscation

KW - Reverse engineering

M3 - Conference contribution/Paper

SN - 9783319694702

T3 - Lecture Notes in Computer Science

SP - 367

EP - 382

BT - Cyberspace Safety and Security

A2 - Wen, S.

A2 - Wu, W.

A2 - Castiglione, A.

PB - Springer

CY - Cham

ER -