Thwarting Android App Repackaging by Executable Code Fragmentation.

Ruxia Fan,Dingyi Fang,Zhanyong Tang,Xiaojiang Chen,Fangyuan Liu,Zhengqiao Li
DOI: https://doi.org/10.1504/ijhpcn.2017.10007201
2017-01-01
Abstract:With the increasing popularity and adoption of Android-based smartphones, there are more and more Android malwares in app marketplaces. What's more, most malwares are repackaged versions of legitimate applications. Existing solutions have mostly focused on post-mortem detection of repackaged application. Lately, packing mechanism has been proposed to enable self-defence for Android apps against repackaging. However, since current app packing systems all load the executable file into process memory in plaintext intactly, it can be easily dumped, which would enable the repackaging again. To address this problem, we propose a more effective protection model, DexSplit, to prevent app repackaging. Inspired by the weakness of current app packing model, DexSplit maintains the protected dex file as several pieces throughout this application's entire lifecycle, which makes it difficult to be dumped. Experiments with a DexSplit prototype using six typical apps show that DexSplit effectively defends against app repackaging threats with reasonable performance overhead.
What problem does this paper attempt to address?