Two-factor Protection Scheme in Securing the Source Code of Android Applications
Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with ISBN/ISSN) › peer-review
Author(s)
Related Research Unit(s)
Detail(s)
Original language | English |
---|---|
Title of host publication | Mobility, Intelligent Networks & Smart Societies |
Subtitle of host publication | Proceedings of the 2nd BCS International IT Conference 2014 |
Editors | Hussain Al-Ahmad |
Publisher | British Computer Society |
Publication status | Published - Mar 2014 |
Publication series
Name | Electronic Workshops in Computing (eWiC) |
---|
Conference
Title | 2014 Electronic Workshops in Computing (eWiC) Conference: "Mobility, Intelligent Networks & Smart Societies" |
---|---|
Place | United Arab Emirates |
City | Abu Dhabi |
Period | 9 - 10 March 2014 |
Link(s)
DOI | DOI |
---|---|
Permanent Link | https://scholars.cityu.edu.hk/en/publications/publication(9c9b676d-e02d-46e7-bd1c-9fb732c8fec6).html |
Abstract
While Android has become most popular OS in mobile phone market, more and more Android app developers are suffering from intellectual property infringement because it’s easy to extract the assets stored in the Android apps and to decompile Android apps to Java source code. This issue also poses threats to users’ privacy. In this article we reviewed the existing protection approaches for the protection of the source code and assets in Android apps, demonstrated the reason why Java Native Interface (JNI) approach can help improve the protection provided by existing approaches, developed 4 Android demo apps with 2 experiments conducted to evaluate the effectiveness of protection provided by the combination of Encryption and JNI approaches.
Research Area(s)
- Android applications, decompilation, reverse-engineering, piracy, encryption, JNI, assets protection
Bibliographic Note
Research Unit(s) information for this publication is provided by the author(s) concerned.
Citation Format(s)
Two-factor Protection Scheme in Securing the Source Code of Android Applications. / TSE, Daniel; LI, Zihuan; TAO, Yuhui et al.
Mobility, Intelligent Networks & Smart Societies: Proceedings of the 2nd BCS International IT Conference 2014. ed. / Hussain Al-Ahmad. British Computer Society, 2014. (Electronic Workshops in Computing (eWiC)).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with ISBN/ISSN) › peer-review