Skip to main content

The Design and Implementation on the Android Application Protection System

  • Conference paper
  • First Online:
Computational Science and Its Applications – ICCSA 2016 (ICCSA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9787))

Included in the following conference series:

  • 1568 Accesses

Abstract

As an open-source mobile platform, Android is facing with the severe problems of security and then the applications that running on this platform also confront with the same threats. This paper concludes the secure problems with which android applications are facing and gives a research on the current defense solutions. A security reinforcement system based on the Dex protection is proposed in order to defense the dynamic monitoring and modification. This system combines the static defense solution and dynamic defense solution, implements the purpose to tamper-proofing, anti-debugging for Android applications and improves the reliability and security of the software.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE), pp. 725–728. IEEE (2015)

    Google Scholar 

  2. Ji H.: The Research and Implement on Operating System of Mobile Phone on Android Platform, Southeast University (2010)

    Google Scholar 

  3. Qiu L, Zhang Z, Shen Z, et al.: AppTrace: Dynamic trace on Android devices. In: 2015 IEEE International Conference on Communications (ICC). IEEE (2015)

    Google Scholar 

  4. Collerg, C., Thomborson, C., Low, D., et al.: A taxonomy of obfuscating transformations. Department of Computer Science, The University of Auckland, New Zealand, July 1997

    Google Scholar 

  5. Yanfei, L., Sha, F., et al.: Survey of software tamper proofing technique. Modern Telecommun. Tech. 45(1), 66–70 (2015). doi:10.3969/j.issn.1002-5316.2015.01.013. 74

    Google Scholar 

  6. Haibo, S., Yuda, S., et al.: Tamper-proofing technology of computer software. Modern Comput. Prof. 2, 45–48 (2005)

    Google Scholar 

  7. Bin, L.: The research and implement on software activity analysis system based on Android sandbox, Beijing University of Posts and Telecommunications (2012)

    Google Scholar 

  8. Zheng, M., Sun, M., Lui, J.C.S.: DroidTrace: a ptrace based Android dynamic analysis system with forward execution capability. In: 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 128–133 (2014)

    Google Scholar 

  9. Feng, X., Lin, J., Jia, S.: The research on security reinforcement of Android applications. In: 2015 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering. Atlantis Press (2015)

    Google Scholar 

Download references

Acknowledgment

This work was supported by National Natural Science Foundation of China (No. 61370195, U1536121, 61070207), Beijing Natural Science Foundation (No. 4132060) and National Cryptography Development Foundation of China (MMJJ201201002).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huang Ruqiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Haoliang, C., Ruqiang, H., Chengjie, S., Shaozhang, N. (2016). The Design and Implementation on the Android Application Protection System. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2016. ICCSA 2016. Lecture Notes in Computer Science(), vol 9787. Springer, Cham. https://doi.org/10.1007/978-3-319-42108-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42108-7_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42107-0

  • Online ISBN: 978-3-319-42108-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics