Abstract

Reverse engineering technique gives the attacker the gamble to embed the new code with apps; there is a chance of losing confidential information or adding some adware. Some most popular tool protects from reverse Engineering like LIAPP, IJIAMI, and ALIBABA, etc. Those tools can encrypt the DEX file in APK; before loading the files dynamically, it decrypts the files; the MultiDEX files do not defend these tools. We propose an approach to protect from reverse engineering methods. Our aim to protects against static repackaging attacks and provides better efficiency in decrypts and loading apps. We introduce the Virtual Machine (VM)-based MultiDEX and share object (SO) protection approach; we used the newly stack-based native code system in this approach. It provides intense level protection under the virtual machine. It leverages multiple dynamic virtual machines protection of bytecode to minimize the overhead. The significant advantage of our approach to protecting the MutiDex files and SO files is that very few systems are available, which take care of both types of files.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.