首 页 本刊概况 出 版 人 发行统计 在线订阅 欢迎投稿 市场分析 1 组织交流 1 关于我们
 
1
   通信短波
1
   新品之窗
1
   优秀论文
1
   通信趋势
1
   特别企划
1
   运营商动态
1
   技术前沿
1
   市场聚焦
1
   通信视点
1
   信息化论坛
1
当前位置:首页 > 优秀论文
Android平台软件保护技术
作者:张 鹏 牛少彰
来源:本站原创
更新时间:2014/3/10 14:36:00
正文:

 

                     (北京邮电大学计算机学院,北京 100876)
摘 要  Android开源的特点使其得到了广大厂商和开发者的支持,但应用市场繁荣的背后却存在大量的软件盗版行为。本文在对Android平台结构进行分析的基础上,分别对几种现有的Android平台软件保护技术进行了总结,如代码混淆技术、动态加载技术、软件水印技术等。
关键词 Android;软件保护;代码混淆;动态加载;软件水印

Software Protection Technology for Android Platform
Zhang  Peng,    Niu  Shaozhang
(School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, 100876)
Abstract  Android gets support from many vendors and developers since it has open source feature. Unfortunately, the booming application market has to face the increasing application pirate. The article tries to survey some technologies which are useful for preventing those threats, such as code obfuscation, dynamic loading, software watermarking.
Keywords  Android; Software Protection; Code Obfuscation; Dynamic Loading; Software Watermarking

 

 

参考文献
[1] Collberg C,Thomborson C,Low D.A Taxonomy of Obfuscating Transformations[R].Department of Computer Science,University of Auckland:Technical Report 10,1997
[2] Chan J T,Yang W.Advanced obfuscation techniques for Java bytecode[J].Journal of Systems and Software,2004,71(1-2):1-10
[3] De A R,Van L O.Stealthy obfuscation techniques:Misleading the pirates[J].Department of Computer Science University of Twente Enschedc,The Netherlands, 2003.
[4] T.W. Hou, H.Y. Chen, M.H. Tsai. Three control flow obfuscation methods for JAVA software[J]. IEEE Proceedings-Software, Vol. 153, No. 2, April 2006.
[5] Sosonkin M,Naumovich G,Memon N.Obfuscation of design intent in object-oriented applications[J]. Proceedings of the Digital Rights Management Workshop.Washington,DC,USA,2003:142-153
[6] Patrick Schulz. Code Protection in Android. Insititute of Computer Science, Rheinische Friedrich-Wilhelms-Universität Bonn, Germany. June 7, 2012
[7] 张立和, 杨义先, 钮心忻, 牛少彰. 软件水印综述[J]. 软件学报, 2003,14(2): 268~277.
[8] Wu Zhou, Yajin Zhou, Xuxian Jiang, and Peng Ning. DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces[C]. In Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY ’12, February 2012.
[9] Jonathan Crussell, Clint Gibler, and Hao Chen. Attack of the Clones: Detecting Cloned Applications on Android Markets[C]. In 17th European Symposium on Research in Computer Security, ESORICS 2012, September 2012.
[10] Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang, and Shihong Zou. Fast, Scalable Detection of Piggybacked Mobile Applications[C]. In Proceedings of the 3nd ACM Conference on Data and Application Security and Privacy, CODASPY ’13,

 
 
   
《通信市场》 中国·北京·复兴路49号通信市场(100036) 点击查看具体位置
电话:86-10-6820 7724, 6820 7726
京ICP备05037146号-8
建议使用 Microsoft IE4.0 以上版本 800*600浏览 如果您有什么建议和意见请与管理员联系