Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1)
  • Open Access

    ARTICLE

    Protecting Android Applications with Multiple DEX Files Against Static Reverse Engineering Attacks

    Kyeonghwan Lim1, Nak Young Kim1, Younsik Jeong1, Seong-je Cho1, Sangchul Han2, Minkyu Park2

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 143-153, 2019, DOI:10.31209/2018.100000051

    Abstract The Android application package (APK) uses the DEX format as an executable file format. Since DEX files are in Java bytecode format, you can easily get Java source code using static reverse engineering tools. This feature makes it easy to steal Android applications. Tools such as ijiami, liapp, alibaba, etc. can be used to protect applications from static reverse engineering attacks. These tools typically save encrypted classes.dex in the APK file, and then decrypt and load dynamically when the application starts. However, these tools do not protect multidex Android applications. A multidex Android application is More >

Displaying 1-10 on page 1 of 1. Per Page