About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Digital Forensics and Cyber Crime. 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part II

Research Article

DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-56583-0_16,
        author={Weimiao Feng and Rui Hu and Cong Zhou and Lei Yu},
        title={DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery},
        proceedings={Digital Forensics and Cyber Crime. 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part II},
        proceedings_a={ICDF2C PART 2},
        year={2024},
        month={4},
        keywords={Android application reinforcement Code disorder Dynamic recovery},
        doi={10.1007/978-3-031-56583-0_16}
    }
    
  • Weimiao Feng
    Rui Hu
    Cong Zhou
    Lei Yu
    Year: 2024
    DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery
    ICDF2C PART 2
    Springer
    DOI: 10.1007/978-3-031-56583-0_16
Weimiao Feng1, Rui Hu1,*, Cong Zhou1, Lei Yu1
  • 1: Institute of Information Engineering
*Contact email: hurui@iie.ac.cn

Abstract

To protect Android applications from reverse engineering, more and more adversarial analysis techniques are proposed, such as packing, encryption, obfuscation, etc. As one of the most advanced techniques for obfuscation, code virtualization at the dex bytecode level has evolved from hiding meta information to protect executable instructions. However, previous approaches are proved to have a certain degree of vulnerability at the directive opcode replacement. In this paper, we present DynVMDroid, a reinforcement system based on code virtualization to protect Android applications from reverse engineering. DynVMDroid consists of two components, a reinforcement engine and a custom runtime environment. The reinforcement engine disrupts the inherent structural order and extends the length of the original instructions from key methods, converting them into virtual code in Android applications. The custom runtime environment dynamically recovering the virtual instructions to ensure the protected application work properly. To verify its performance and compatibility, we have applied DynVMDroid to 10 applications. In addition, various attack methods have been adopted on the protected applications to validate their security. Our experimental results show that the applications protected by DynVMDroid perform correctly and effectively against common reverse analysis techniques with acceptable performance losses.

Keywords
Android application reinforcement Code disorder Dynamic recovery
Published
2024-04-03
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-56583-0_16
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL