Abstract
As an integral part of Android system security, Android application protection has always been favored by researchers. The current popular protection schemes include the source code confusion, anti-debugging technology, and confusions of executable files. However, these schemes modify the applications more or less undoubtedly, and that causes inconvenience while these applications are running. This article proposes a kernel-level Android application protection scheme which can eliminate the need for additional application modifications and protect all application data. Therefore, we designed an encryption system and implemented a prototype system Godzilla on the basis of the Linux kernel 3.18.14 in order to verify the validity of the design. Experiments show that the system can achieve our goals well. Compared to non-protected applications, protected ones will have corresponding time loss during installation and startup, but they are all within acceptable limits.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Developers, Android. What is android (2011)
Wikipedia. https://en.wikipedia.org/wiki/Android_(operating_system). Accessed 29 May 2018
Hur, J.B., Shamsi, J.A.: A survey on security issues, vulnerabilities and attacks in Android based smartphone. In: 2017 International Conference on Information and Communication Technologies (ICICT), pp. 40–46. IEEE (2017)
Xue, Y., Tan, Y., Liang, C., Li, Y., Zheng, J., Zhang, Q.: RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444, 36–50 (2018)
Tan, Y., et al.: A root privilege management scheme with revocable authorization for Android devices. J. Netw. Comput. 107(4), 69–82 (2018)
Xue, Y., Tan, Y., Liang, C., Zhang, C., Zheng, J.: An optimized data hiding scheme for deflate codes. Soft. Comput. 22(13), 4445–4455 (2018)
Kovacheva, A.: Efficient code obfuscation for Android. In: Papasratorn, B., Charoenkitkarn, N., Vanijja, V., Chongsuphajaisiddhi, V. (eds.) IAIT 2013. CCIS, vol. 409, pp. 104–119. Springer, Cham (2013). https://doi.org/10.1007/978-3-319-03783-7_10
Wan, J.: Android app protection through anti-tampering and anti-debugging techniques. Ph.D. dissertation, Queen’s University (Canada) (2018)
Love, R.: Linux kernel development. System 66(66), 69–70 (2005). Author, F.: Article title. Journal 2(5), 99–110 (2016)
Saout, C.: dm-crypt: a device-mapper crypto target (2007). http://www.saout.de/misc/dm-crypt (2014)
Corbet, J., LWN.net Weekly: Ext4 encryption. Lwn.net (2015)
Zhang, X., et al.: Cryptographic key protection against FROST for mobile devices. Clust. Comput. 20(3), 2393–2402 (2017)
Gorman, M.: Understanding the Linux Virtual Memory Manager. Prentice Hall, Upper Saddle River (2004)
Google Play Store. https://play.google.com/store/apps/collection/topselling_free. Accessed 29 May 2018
AutoMatorX. https://github.com/NetEaseGame/ATX. Accessed 29 May 2018
Acknowledgement
This work was supported by Guangzhou scholars project for universities of Guangzhou (No. 1201561613).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, T., Liu, L., Gao, C., Hu, J., Liu, J. (2018). Towards Android Application Protection via Kernel Extension. In: Hu, T., Wang, F., Li, H., Wang, Q. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science(), vol 11338. Springer, Cham. https://doi.org/10.1007/978-3-030-05234-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-05234-8_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05233-1
Online ISBN: 978-3-030-05234-8
eBook Packages: Computer ScienceComputer Science (R0)