Cargando…

Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART

As interest in Internet of Things environments rapidly increases throughout the IT convergence field, compatibility with mobile devices must be provided to enable personalized services. The security of mobile platforms and applications is critical because security vulnerabilities of mobile devices c...

Descripción completa

Detalles Bibliográficos
Autores principales: Na, Geonbae, Lim, Jongsu, Lee, Sunjun, Yi, Jeong Hyun
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6603642/
https://www.ncbi.nlm.nih.gov/pubmed/31185579
http://dx.doi.org/10.3390/s19112625
_version_ 1783431552296812544
author Na, Geonbae
Lim, Jongsu
Lee, Sunjun
Yi, Jeong Hyun
author_facet Na, Geonbae
Lim, Jongsu
Lee, Sunjun
Yi, Jeong Hyun
author_sort Na, Geonbae
collection PubMed
description As interest in Internet of Things environments rapidly increases throughout the IT convergence field, compatibility with mobile devices must be provided to enable personalized services. The security of mobile platforms and applications is critical because security vulnerabilities of mobile devices can be spread to all things in these environments. Android, the leading open mobile platform, has long used the Dalvik virtual machine as its runtime system. However, it has recently been completely replaced by a new runtime system, namely Android Runtime (ART). The change from Android’s Dalvik to ART means that the existing Dalvik bytecode-based application execution structure has been changed to a machine code-based application execution structure. Consequently, a detailed understanding of ART, such as new file formats and execution switching methods between codes, is required from the viewpoint of application security. In this paper, we demonstrate that an existing Dalvik-based application vulnerability can be exploited as-is in ART. This is because existing Dalvik executable files coexist in the ART executable file, and these Dalvik bytecodes and compiled machine codes have one-to-one mapping relationships. We then propose an ART-based application protection scheme to secure this by dynamically eliminating the one-to-one mapping. In addition, the proposed scheme is implemented to evaluate its reverse engineering resistance and performance through experiments.
format Online
Article
Text
id pubmed-6603642
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-66036422019-07-17 Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART Na, Geonbae Lim, Jongsu Lee, Sunjun Yi, Jeong Hyun Sensors (Basel) Article As interest in Internet of Things environments rapidly increases throughout the IT convergence field, compatibility with mobile devices must be provided to enable personalized services. The security of mobile platforms and applications is critical because security vulnerabilities of mobile devices can be spread to all things in these environments. Android, the leading open mobile platform, has long used the Dalvik virtual machine as its runtime system. However, it has recently been completely replaced by a new runtime system, namely Android Runtime (ART). The change from Android’s Dalvik to ART means that the existing Dalvik bytecode-based application execution structure has been changed to a machine code-based application execution structure. Consequently, a detailed understanding of ART, such as new file formats and execution switching methods between codes, is required from the viewpoint of application security. In this paper, we demonstrate that an existing Dalvik-based application vulnerability can be exploited as-is in ART. This is because existing Dalvik executable files coexist in the ART executable file, and these Dalvik bytecodes and compiled machine codes have one-to-one mapping relationships. We then propose an ART-based application protection scheme to secure this by dynamically eliminating the one-to-one mapping. In addition, the proposed scheme is implemented to evaluate its reverse engineering resistance and performance through experiments. MDPI 2019-06-10 /pmc/articles/PMC6603642/ /pubmed/31185579 http://dx.doi.org/10.3390/s19112625 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Na, Geonbae
Lim, Jongsu
Lee, Sunjun
Yi, Jeong Hyun
Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART
title Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART
title_full Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART
title_fullStr Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART
title_full_unstemmed Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART
title_short Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART
title_sort mobile code anti-reversing scheme based on bytecode trapping in art
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6603642/
https://www.ncbi.nlm.nih.gov/pubmed/31185579
http://dx.doi.org/10.3390/s19112625
work_keys_str_mv AT nageonbae mobilecodeantireversingschemebasedonbytecodetrappinginart
AT limjongsu mobilecodeantireversingschemebasedonbytecodetrappinginart
AT leesunjun mobilecodeantireversingschemebasedonbytecodetrappinginart
AT yijeonghyun mobilecodeantireversingschemebasedonbytecodetrappinginart