A core code reinforcement method based on dynamic loading on Android platform

Recently, those methods of protecting application from crack have a great development. Code obfuscation, dynamic link library, software shelling, those methods all have different levels of innovation and optimization [1]. However, various software crack technology also became increasingly mature. St...

Full description

Saved in:
Bibliographic Details
Published in2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC) pp. 284 - 287
Main Authors Junchen Li, Fengmin Li, Jian Kuang, Song Song, Juchen Pan
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.09.2016
Subjects
Online AccessGet full text
ISBN9781509012459
1509012451
DOI10.1109/ICNIDC.2016.7974581

Cover

More Information
Summary:Recently, those methods of protecting application from crack have a great development. Code obfuscation, dynamic link library, software shelling, those methods all have different levels of innovation and optimization [1]. However, various software crack technology also became increasingly mature. Static code analysis cooperating with dynamic code analysis makes mostly code reinforcement method failed. After analyzing all of those code reinforcement method, author came up with a kind of core code reinforcement method, which is organized with client and server architecture and based on dynamic loading. Different with most methods, this method can ensure even if hacker has obtained the original dex file, the application can still be safe.
ISBN:9781509012459
1509012451
DOI:10.1109/ICNIDC.2016.7974581