TY - GEN
T1 - Repackage-proofing android apps
AU - Luo, Lannan
AU - Fu, Yu
AU - Wu, Dinghao
AU - Zhu, Sencun
AU - Liu, Peng
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/9/29
Y1 - 2016/9/29
N2 - App repackaging has become a severe threat to theAndroid ecosystem. While various protection techniques, such aswatermarking and repackaging detection, have been proposed, adefense that stops repackaged apps from working on user devices, i.e., repackage-proofing, is missing. We propose a technique thatbuilds a reliable and stealthy repackage-proofing capability intoAndroid apps. A large number of detection nodes are insertedinto the original app without incurring much overhead, each iswoven into the surrounding code to blur itself. Once repackagingis detected, a response node injects a failure in the form ofdelayed malfunctions, making it difficult to trace back. Theresponse nodes and detection nodes form high-degree connectionsand communicate through stealthy communication channels, suchthat upon detection several of the many response nodes areselected stochastically to take actions, which further obfuscatesand enhances the protection. We have built a prototype. Theevaluation shows that the technique is effective and efficient.
AB - App repackaging has become a severe threat to theAndroid ecosystem. While various protection techniques, such aswatermarking and repackaging detection, have been proposed, adefense that stops repackaged apps from working on user devices, i.e., repackage-proofing, is missing. We propose a technique thatbuilds a reliable and stealthy repackage-proofing capability intoAndroid apps. A large number of detection nodes are insertedinto the original app without incurring much overhead, each iswoven into the surrounding code to blur itself. Once repackagingis detected, a response node injects a failure in the form ofdelayed malfunctions, making it difficult to trace back. Theresponse nodes and detection nodes form high-degree connectionsand communicate through stealthy communication channels, suchthat upon detection several of the many response nodes areselected stochastically to take actions, which further obfuscatesand enhances the protection. We have built a prototype. Theevaluation shows that the technique is effective and efficient.
UR - http://www.scopus.com/inward/record.url?scp=84994357254&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84994357254&partnerID=8YFLogxK
U2 - 10.1109/DSN.2016.56
DO - 10.1109/DSN.2016.56
M3 - Conference contribution
AN - SCOPUS:84994357254
T3 - Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016
SP - 550
EP - 561
BT - Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 46th IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016
Y2 - 28 June 2016 through 1 July 2016
ER -