Active warden attack: On the (in)effectiveness of Android app repackage-proofing
App repackaging has raised serious concerns to the Android ecosystem with the repackage-proofing technology attracting attention in the Android research community. In this paper, we first show that existing repackage-proofing schemes rely on a flawed security assumption, and then propose a new class...
Saved in:
Main Authors: | MA, Haoyu, LI, Shijia, GAO, Debin, WU, Daoyuan, JIA, Qiaowen, JIA, Chunfu |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2022
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/6703 https://ink.library.smu.edu.sg/context/sis_research/article/7706/viewcontent/tdsc_2021_1.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Secure repackage-proofing framework for Android apps using Collatz conjecture
by: MA, Haoyu, et al.
Published: (2021) -
Measuring the declared SDK versions and their consistency with API calls in android apps
by: WU, Daoyuan, et al.
Published: (2017) -
Understanding Android app piggybacking: A systematic study of malicious code grafting
by: LI, Li, et al.
Published: (2017) -
MtdScout : Complementing the identification of insecure methods in Android apps via source-to-bytecode signature generation and tree-based layered search
by: ZHANG, Zicheng, et al.
Published: (2024) -
On the usability (in)security of in-app browsing interfaces in mobile apps
by: ZHANG, Zicheng, et al.
Published: (2021)