
Research Article
DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery
@INPROCEEDINGS{10.1007/978-3-031-56583-0_16, author={Weimiao Feng and Rui Hu and Cong Zhou and Lei Yu}, title={DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery}, proceedings={Digital Forensics and Cyber Crime. 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part II}, proceedings_a={ICDF2C PART 2}, year={2024}, month={4}, keywords={Android application reinforcement Code disorder Dynamic recovery}, doi={10.1007/978-3-031-56583-0_16} }
- Weimiao Feng
Rui Hu
Cong Zhou
Lei Yu
Year: 2024
DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery
ICDF2C PART 2
Springer
DOI: 10.1007/978-3-031-56583-0_16
Abstract
To protect Android applications from reverse engineering, more and more adversarial analysis techniques are proposed, such as packing, encryption, obfuscation, etc. As one of the most advanced techniques for obfuscation, code virtualization at the dex bytecode level has evolved from hiding meta information to protect executable instructions. However, previous approaches are proved to have a certain degree of vulnerability at the directive opcode replacement. In this paper, we present DynVMDroid, a reinforcement system based on code virtualization to protect Android applications from reverse engineering. DynVMDroid consists of two components, a reinforcement engine and a custom runtime environment. The reinforcement engine disrupts the inherent structural order and extends the length of the original instructions from key methods, converting them into virtual code in Android applications. The custom runtime environment dynamically recovering the virtual instructions to ensure the protected application work properly. To verify its performance and compatibility, we have applied DynVMDroid to 10 applications. In addition, various attack methods have been adopted on the protected applications to validate their security. Our experimental results show that the applications protected by DynVMDroid perform correctly and effectively against common reverse analysis techniques with acceptable performance losses.