Cargando…
Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART
As interest in Internet of Things environments rapidly increases throughout the IT convergence field, compatibility with mobile devices must be provided to enable personalized services. The security of mobile platforms and applications is critical because security vulnerabilities of mobile devices c...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6603642/ https://www.ncbi.nlm.nih.gov/pubmed/31185579 http://dx.doi.org/10.3390/s19112625 |
_version_ | 1783431552296812544 |
---|---|
author | Na, Geonbae Lim, Jongsu Lee, Sunjun Yi, Jeong Hyun |
author_facet | Na, Geonbae Lim, Jongsu Lee, Sunjun Yi, Jeong Hyun |
author_sort | Na, Geonbae |
collection | PubMed |
description | As interest in Internet of Things environments rapidly increases throughout the IT convergence field, compatibility with mobile devices must be provided to enable personalized services. The security of mobile platforms and applications is critical because security vulnerabilities of mobile devices can be spread to all things in these environments. Android, the leading open mobile platform, has long used the Dalvik virtual machine as its runtime system. However, it has recently been completely replaced by a new runtime system, namely Android Runtime (ART). The change from Android’s Dalvik to ART means that the existing Dalvik bytecode-based application execution structure has been changed to a machine code-based application execution structure. Consequently, a detailed understanding of ART, such as new file formats and execution switching methods between codes, is required from the viewpoint of application security. In this paper, we demonstrate that an existing Dalvik-based application vulnerability can be exploited as-is in ART. This is because existing Dalvik executable files coexist in the ART executable file, and these Dalvik bytecodes and compiled machine codes have one-to-one mapping relationships. We then propose an ART-based application protection scheme to secure this by dynamically eliminating the one-to-one mapping. In addition, the proposed scheme is implemented to evaluate its reverse engineering resistance and performance through experiments. |
format | Online Article Text |
id | pubmed-6603642 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-66036422019-07-17 Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART Na, Geonbae Lim, Jongsu Lee, Sunjun Yi, Jeong Hyun Sensors (Basel) Article As interest in Internet of Things environments rapidly increases throughout the IT convergence field, compatibility with mobile devices must be provided to enable personalized services. The security of mobile platforms and applications is critical because security vulnerabilities of mobile devices can be spread to all things in these environments. Android, the leading open mobile platform, has long used the Dalvik virtual machine as its runtime system. However, it has recently been completely replaced by a new runtime system, namely Android Runtime (ART). The change from Android’s Dalvik to ART means that the existing Dalvik bytecode-based application execution structure has been changed to a machine code-based application execution structure. Consequently, a detailed understanding of ART, such as new file formats and execution switching methods between codes, is required from the viewpoint of application security. In this paper, we demonstrate that an existing Dalvik-based application vulnerability can be exploited as-is in ART. This is because existing Dalvik executable files coexist in the ART executable file, and these Dalvik bytecodes and compiled machine codes have one-to-one mapping relationships. We then propose an ART-based application protection scheme to secure this by dynamically eliminating the one-to-one mapping. In addition, the proposed scheme is implemented to evaluate its reverse engineering resistance and performance through experiments. MDPI 2019-06-10 /pmc/articles/PMC6603642/ /pubmed/31185579 http://dx.doi.org/10.3390/s19112625 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Na, Geonbae Lim, Jongsu Lee, Sunjun Yi, Jeong Hyun Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART |
title | Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART |
title_full | Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART |
title_fullStr | Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART |
title_full_unstemmed | Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART |
title_short | Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART |
title_sort | mobile code anti-reversing scheme based on bytecode trapping in art |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6603642/ https://www.ncbi.nlm.nih.gov/pubmed/31185579 http://dx.doi.org/10.3390/s19112625 |
work_keys_str_mv | AT nageonbae mobilecodeantireversingschemebasedonbytecodetrappinginart AT limjongsu mobilecodeantireversingschemebasedonbytecodetrappinginart AT leesunjun mobilecodeantireversingschemebasedonbytecodetrappinginart AT yijeonghyun mobilecodeantireversingschemebasedonbytecodetrappinginart |