(北京郵電大學計算機學院,北京 100876)
摘 要 Android開源的特點使其得到了廣大廠商和開發者的支持,但應用市場繁榮的背后卻存在大量的軟件盜版行為。本文在對Android平臺結構進行分析的基礎上,分別對幾種現有的Android平臺軟件保護技術進行了總結,如代碼混淆技術、動態加載技術、軟件水印技術等。
關鍵詞 Android;軟件保護;代碼混淆;動態加載;軟件水印
Software Protection Technology for Android Platform
Zhang Peng, Niu Shaozhang
(School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, 100876)
Abstract Android gets support from many vendors and developers since it has open source feature. Unfortunately, the booming application market has to face the increasing application pirate. The article tries to survey some technologies which are useful for preventing those threats, such as code obfuscation, dynamic loading, software watermarking.
Keywords Android; Software Protection; Code Obfuscation; Dynamic Loading; Software Watermarking
參考文獻
[1] Collberg C,Thomborson C,Low D.A Taxonomy of Obfuscating Transformations[R].Department of Computer Science,University of Auckland:Technical Report 10,1997
[2] Chan J T,Yang W.Advanced obfuscation techniques for Java bytecode[J].Journal of Systems and Software,2004,71(1-2):1-10
[3] De A R,Van L O.Stealthy obfuscation techniques:Misleading the pirates[J].Department of Computer Science University of Twente Enschedc,The Netherlands, 2003.
[4] T.W. Hou, H.Y. Chen, M.H. Tsai. Three control flow obfuscation methods for JAVA software[J]. IEEE Proceedings-Software, Vol. 153, No. 2, April 2006.
[5] Sosonkin M,Naumovich G,Memon N.Obfuscation of design intent in object-oriented applications[J]. Proceedings of the Digital Rights Management Workshop.Washington,DC,USA,2003:142-153
[6] Patrick Schulz. Code Protection in Android. Insititute of Computer Science, Rheinische Friedrich-Wilhelms-Universität Bonn, Germany. June 7, 2012
[7] 張立和, 楊義先, 鈕心忻, 牛少彰. 軟件水印綜述[J]. 軟件學報, 2003,14(2): 268~277.
[8] Wu Zhou, Yajin Zhou, Xuxian Jiang, and Peng Ning. DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces[C]. In Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY ’12, February 2012.
[9] Jonathan Crussell, Clint Gibler, and Hao Chen. Attack of the Clones: Detecting Cloned Applications on Android Markets[C]. In 17th European Symposium on Research in Computer Security, ESORICS 2012, September 2012.
[10] Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang, and Shihong Zou. Fast, Scalable Detection of Piggybacked Mobile Applications[C]. In Proceedings of the 3nd ACM Conference on Data and Application Security and Privacy, CODASPY ’13,