...
首页> 外文期刊>Computers & Security >You Shall not Repackage! Demystifying Anti-Repackaging on Android
【24h】

You Shall not Repackage! Demystifying Anti-Repackaging on Android

机译:你不得重新包装!在Android上搅拌抗重新包装

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

App repackaging refers to the practice of customizing an existing mobile app and redistributing it in the wild. In this way, the attacker aims to force some mobile users to install the repackaged (likely malicious) app instead of the original one. This phenomenon strongly affects Android, where apps are available on public stores, and the only requirement for an app to execute properly is to be digitally signed. Anti-repackaging techniques try counteracting this attack by adding logical controls in the app at compile-time. Such controls activate in case of repackaging and lead the repackaged app to fail at runtime. On the other side, the attacker must detect and bypass the controls to repackage safely. The high-availability of working repackaged apps in the Android ecosystem suggests that the attacker's side is winning. In this respect, this paper aims to bring out the main issues of the current anti-repackaging approaches. The contribution of the paper is three-fold: 1) analyze the weaknesses of the current state-of-the-art anti-repackaging schemes (i.e., Self-Protection through Dex Encryption, AppIS, SSN, SDC, BombDroid, and NRP), 2) summarize the main attack vectors to anti-repackaging techniques composing those schemes, and 3) show how such attack vectors allow circumventing the current proposals. The paper will also show a full-fledged attack to NRP, the only publicly-available anti-repackaging tool to date.
机译:应用程序重新包装是指定制现有移动应用程序并在野外重新分配它的实践。通过这种方式,攻击者旨在强制一些移动用户安装重新包装(可能的恶意)应用而不是原始的应用程序。这种现象强烈影响Android,在公共商店上市的应用程序,以及才能正确执行应用程序的唯一要求将被数字签名。反重复包装技术尝试通过在编译时添加应用程序中的逻辑控件来抵消此攻击。这种控制在重新包装的情况下激活并引导重新包装的应用程序在运行时失败。在另一边,攻击者必须检测和绕过控件安全地重新包装。 Android Ecosystem中的工作重新包装应用程序的高可用性表明攻击者的一方正在获胜。在这方面,本文旨在提出目前的防灌装方法的主要问题。纸张的贡献是三倍:1)分析目前最先进的防置包装方案的弱点(即通过DEX加密,APPIS,SSN,SDC,Bombdroid和NRP自我保护) 2)总结了构成这些方案的反重新包装技术的主要攻击向量,以及3)显示这种攻击矢量如何允许绕过当前的建议。本文还将显示迄今为止唯一可公开的防拆重建工具的全迁攻击攻击。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号