{"title":"使用类加密和本地代码保护Android应用程序免受反编译","authors":"Stefan Ilić, Slavica Dukic","doi":"10.1109/ZINC.2016.7513642","DOIUrl":null,"url":null,"abstract":"In this paper we analyzed how different methods of protection, namely class encryption and usage of native code, affect decompilation of Android applications. This is important in consumer electronics as it can be used to stop repackaging and spreading of maliciously modified applications. We analyzed two different methods of protection, their benefits and flaws.","PeriodicalId":125652,"journal":{"name":"2016 Zooming Innovation in Consumer Electronics International Conference (ZINC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Protection of Android applications from decompilation using class encryption and native code\",\"authors\":\"Stefan Ilić, Slavica Dukic\",\"doi\":\"10.1109/ZINC.2016.7513642\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we analyzed how different methods of protection, namely class encryption and usage of native code, affect decompilation of Android applications. This is important in consumer electronics as it can be used to stop repackaging and spreading of maliciously modified applications. We analyzed two different methods of protection, their benefits and flaws.\",\"PeriodicalId\":125652,\"journal\":{\"name\":\"2016 Zooming Innovation in Consumer Electronics International Conference (ZINC)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Zooming Innovation in Consumer Electronics International Conference (ZINC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ZINC.2016.7513642\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Zooming Innovation in Consumer Electronics International Conference (ZINC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ZINC.2016.7513642","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Protection of Android applications from decompilation using class encryption and native code
In this paper we analyzed how different methods of protection, namely class encryption and usage of native code, affect decompilation of Android applications. This is important in consumer electronics as it can be used to stop repackaging and spreading of maliciously modified applications. We analyzed two different methods of protection, their benefits and flaws.