Kyeonghwan Lim1, Nak Young Kim1, Younsik Jeong1, Seong-je Cho1, Sangchul Han2, Minkyu Park2
Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 143-153, 2019, DOI:10.31209/2018.100000051
Abstract The Android application package (APK) uses the DEX format as an executable
file format. Since DEX files are in Java bytecode format, you can easily get Java
source code using static reverse engineering tools. This feature makes it easy
to steal Android applications. Tools such as ijiami, liapp, alibaba, etc. can be
used to protect applications from static reverse engineering attacks. These tools
typically save encrypted classes.dex in the APK file, and then decrypt and load
dynamically when the application starts. However, these tools do not protect
multidex Android applications. A multidex Android application is More >