{"title":"基于Android应用版权保护混合模型的移动设备内存黑客分析","authors":"Hoon Lee, H. S. Chung, Sung-Ryul Kim","doi":"10.1145/2513228.2513312","DOIUrl":null,"url":null,"abstract":"Google's Android platform is a widely used operating system for mobile phones and a fully commercial application (App) market has been established. However, because of the easy access to Android internal files, unlicensed Android Apps are widely being distributed. To protect the intellectual property of Android developers, various techniques are being proposed that can prevent the illegal access to Apps [6]. But all current techniques ignore the possibility of memory hacking. We show by example that memory hacking is actually possible on Android devices. In this paper we especially focused on the possibility of memory hacking and show that it is indeed possible, which shows that the memory hacking factor has to be included in the security analysis of current protection systems.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Memory hacking analysis in mobile devices for hybrid model of copyright protection for Android apps\",\"authors\":\"Hoon Lee, H. S. Chung, Sung-Ryul Kim\",\"doi\":\"10.1145/2513228.2513312\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Google's Android platform is a widely used operating system for mobile phones and a fully commercial application (App) market has been established. However, because of the easy access to Android internal files, unlicensed Android Apps are widely being distributed. To protect the intellectual property of Android developers, various techniques are being proposed that can prevent the illegal access to Apps [6]. But all current techniques ignore the possibility of memory hacking. We show by example that memory hacking is actually possible on Android devices. In this paper we especially focused on the possibility of memory hacking and show that it is indeed possible, which shows that the memory hacking factor has to be included in the security analysis of current protection systems.\",\"PeriodicalId\":120340,\"journal\":{\"name\":\"Research in Adaptive and Convergent Systems\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Research in Adaptive and Convergent Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2513228.2513312\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Research in Adaptive and Convergent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2513228.2513312","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Memory hacking analysis in mobile devices for hybrid model of copyright protection for Android apps
Google's Android platform is a widely used operating system for mobile phones and a fully commercial application (App) market has been established. However, because of the easy access to Android internal files, unlicensed Android Apps are widely being distributed. To protect the intellectual property of Android developers, various techniques are being proposed that can prevent the illegal access to Apps [6]. But all current techniques ignore the possibility of memory hacking. We show by example that memory hacking is actually possible on Android devices. In this paper we especially focused on the possibility of memory hacking and show that it is indeed possible, which shows that the memory hacking factor has to be included in the security analysis of current protection systems.