Font Size: a A A

Research Of Software Protection On Android Platform

Posted on:2013-03-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y YangFull Text:PDF
GTID:2248330371967484Subject:Information security
Abstract/Summary:PDF Full Text Request
On November 5 2007, Google announced the launch of Android, which is a Linux based and open source smart phone operating system. Today, Android has become the most popular development platform for mobile terminals developers. However, software protection techniques on Android applications are rarely studied. Many Android applications have been cracked, which seriously depress the interest and enthusiasm of the application developers.Based on traditional software protection technologies, combined with features of Android platform, this paper presents a software protection system for Android applications, which based on key protection and tamper resistance.Main work done by the paper as follows:(1) Analyzed the Android platform software protection threats category:internet threats, internal threats and malicious host threats. Analyzed the Android platform software protection faced attacks: unauthorized copying, reverse engineering, tampering, and described in detail the tools used to attack and the attack processes. On this basis, an Android software protection evaluate model was proposed based on authentication, confidentiality and integrity. Finally, using the evaluate model, the applicability on Android platform of traditional software protection technology and the existing Android software protection technology vulnerabilities were discussed.(2) Based on the above analysis, we proposed a key protection and tamper resistance based Android software protection scheme. The scheme is based on reinforcement systems and software developers in a collaborative manner. The software protection function and the key information of the application were packaged in the dynamic link library, application by calling the dynamic link library for software protection. The scheme primarily consists of three core functions:key protection technology based on data and code conversion technique, tamper resistance technology based on the integrity check, anti-reverse engineering technology based on traditional software protection techniques and Android system features.(3) Designed and implemented an Android software protection system based on the scheme above. Then analyzed applications’reinforced security, performance, cost, etc. Experimental results show that the reenforced application meets the software protection purposes within the acceptable range in space and time overhead.
Keywords/Search Tags:Software Protection, Android, Key Protection, Tamper Resistance, Reverse Engineering
PDF Full Text Request
Related items