Two-factor Protection Scheme in Securing the Source Code of Android Applications

Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)peer-review

View graph of relations

Author(s)

  • Daniel TSE
  • Zihuan LI
  • Yuhui TAO
  • Ka Fai WONG
  • Wai Hou CHOI
  • And 1 others
  • Wei LIU

Related Research Unit(s)

Detail(s)

Original languageEnglish
Title of host publicationMobility, Intelligent Networks & Smart Societies
Subtitle of host publicationProceedings of the 2nd BCS International IT Conference 2014
EditorsHussain Al-Ahmad
PublisherBritish Computer Society
Publication statusPublished - Mar 2014

Publication series

NameElectronic Workshops in Computing (eWiC)

Conference

Title2014 Electronic Workshops in Computing (eWiC) Conference: "Mobility, Intelligent Networks & Smart Societies"
PlaceUnited Arab Emirates
CityAbu Dhabi
Period9 - 10 March 2014

Abstract

While Android has become most popular OS in mobile phone market, more and more Android app developers are suffering from intellectual property infringement because it’s easy to extract the assets stored in the Android apps and to decompile Android apps to Java source code. This issue also poses threats to users’ privacy. In this article we reviewed the existing protection approaches for the protection of the source code and assets in Android apps, demonstrated the reason why Java Native Interface (JNI) approach can help improve the protection provided by existing approaches, developed 4 Android demo apps with 2 experiments conducted to evaluate the effectiveness of protection provided by the combination of Encryption and JNI approaches.

Research Area(s)

  • Android applications, decompilation, reverse-engineering, piracy, encryption, JNI, assets protection

Bibliographic Note

Research Unit(s) information for this publication is provided by the author(s) concerned.

Citation Format(s)

Two-factor Protection Scheme in Securing the Source Code of Android Applications. / TSE, Daniel; LI, Zihuan; TAO, Yuhui et al.

Mobility, Intelligent Networks & Smart Societies: Proceedings of the 2nd BCS International IT Conference 2014. ed. / Hussain Al-Ahmad. British Computer Society, 2014. (Electronic Workshops in Computing (eWiC)).

Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)peer-review