Development of wrapper application to prevent reverse engineering of android applications
Android operating system is an open-source project developed by Google. It is based on the Linux kernel. According an article published in 2016, Google’s Android dominated the mobile operating system scene with an 87.5% market share. With more than 2 billion users and 3.5 million applications in the...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/74052 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-74052 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-740522023-03-03T20:58:00Z Development of wrapper application to prevent reverse engineering of android applications Gong, Jing Liu Yang School of Computer Science and Engineering DRNTU::Engineering::Computer science and engineering::Software::Software engineering Android operating system is an open-source project developed by Google. It is based on the Linux kernel. According an article published in 2016, Google’s Android dominated the mobile operating system scene with an 87.5% market share. With more than 2 billion users and 3.5 million applications in the Google Play store, application development has become a lucrative gold mine with billions being made yearly. Android’s popularity has attracted its fair share of adversaries, such as reverse engineers and malware developers. Therefore, it is essential for a mechanism to be in place to safeguard the intellectual property of the Android developers. Several companies try to address this issue, with 2 major companies in China, Bangcle and Ijiami leading the pack. However, these wrapper applications proved to be effective in hiding the application codes only to a certain extend as several research papers have already proposed ways to bypass these wrapper applications. This report aims to analyse how both the packers and unpackers work and develop a new methodology of packing Android applications. The new methodology should change the structure the original Dex file while maintaining the original control flow of the application. Additional protection features anti-debugging and anti-tampering. Lastly, the new methodology is tested against current unpacking techniques to measure its effectiveness. Results show that application packed using the new methodology is undebuggable. Its source code is hidden and encrypted. Integrity of the source code is maintained by the anti-tampering feature. However, as the original source code gets more complicated, the application may not work as intended. Bachelor of Engineering (Computer Science) 2018-04-24T04:06:58Z 2018-04-24T04:06:58Z 2018 Final Year Project (FYP) http://hdl.handle.net/10356/74052 en Nanyang Technological University 43 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering::Software::Software engineering |
spellingShingle |
DRNTU::Engineering::Computer science and engineering::Software::Software engineering Gong, Jing Development of wrapper application to prevent reverse engineering of android applications |
description |
Android operating system is an open-source project developed by Google. It is based on the Linux kernel. According an article published in 2016, Google’s Android dominated the mobile operating system scene with an 87.5% market share. With more than 2 billion users and 3.5 million applications in the Google Play store, application development has become a lucrative gold mine with billions being made yearly. Android’s popularity has attracted its fair share of adversaries, such as reverse engineers and malware developers. Therefore, it is essential for a mechanism to be in place to safeguard the intellectual property of the Android developers. Several companies try to address this issue, with 2 major companies in China, Bangcle and Ijiami leading the pack. However, these wrapper applications proved to be effective in hiding the application codes only to a certain extend as several research papers have already proposed ways to bypass these wrapper applications. This report aims to analyse how both the packers and unpackers work and develop a new methodology of packing Android applications. The new methodology should change the structure the original Dex file while maintaining the original control flow of the application. Additional protection features anti-debugging and anti-tampering. Lastly, the new methodology is tested against current unpacking techniques to measure its effectiveness. Results show that application packed using the new methodology is undebuggable. Its source code is hidden and encrypted. Integrity of the source code is maintained by the anti-tampering feature. However, as the original source code gets more complicated, the application may not work as intended. |
author2 |
Liu Yang |
author_facet |
Liu Yang Gong, Jing |
format |
Final Year Project |
author |
Gong, Jing |
author_sort |
Gong, Jing |
title |
Development of wrapper application to prevent reverse engineering of android applications |
title_short |
Development of wrapper application to prevent reverse engineering of android applications |
title_full |
Development of wrapper application to prevent reverse engineering of android applications |
title_fullStr |
Development of wrapper application to prevent reverse engineering of android applications |
title_full_unstemmed |
Development of wrapper application to prevent reverse engineering of android applications |
title_sort |
development of wrapper application to prevent reverse engineering of android applications |
publishDate |
2018 |
url |
http://hdl.handle.net/10356/74052 |
_version_ |
1759855156259717120 |