(北京邮电大学计算机学院,北京 100876)
摘 要 Android开源的特点使其得到了广大厂商和开发者的支持,但应用市场繁荣的背后却存在大量的软件盗版行为。本文在对Android平台结构进行分析的基础上,分别对几种现有的Android平台软件保护技术进行了总结,如代码混淆技术、动态加载技术、软件水印技术等。
关键词 Android;软件保护;代码混淆;动态加载;软件水印
Software Protection Technology for Android Platform
Zhang Peng, Niu Shaozhang
(School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, 100876)
Abstract Android gets support from many vendors and developers since it has open source feature. Unfortunately, the booming application market has to face the increasing application pirate. The article tries to survey some technologies which are useful for preventing those threats, such as code obfuscation, dynamic loading, software watermarking.
Keywords Android; Software Protection; Code Obfuscation; Dynamic Loading; Software Watermarking
参考文献
[1] Collberg C,Thomborson C,Low D.A Taxonomy of Obfuscating Transformations[R].Department of Computer Science,University of Auckland:Technical Report 10,1997
[2] Chan J T,Yang W.Advanced obfuscation techniques for Java bytecode[J].Journal of Systems and Software,2004,71(1-2):1-10
[3] De A R,Van L O.Stealthy obfuscation techniques:Misleading the pirates[J].Department of Computer Science University of Twente Enschedc,The Netherlands, 2003.
[4] T.W. Hou, H.Y. Chen, M.H. Tsai. Three control flow obfuscation methods for JAVA software[J]. IEEE Proceedings-Software, Vol. 153, No. 2, April 2006.
[5] Sosonkin M,Naumovich G,Memon N.Obfuscation of design intent in object-oriented applications[J]. Proceedings of the Digital Rights Management Workshop.Washington,DC,USA,2003:142-153
[6] Patrick Schulz. Code Protection in Android. Insititute of Computer Science, Rheinische Friedrich-Wilhelms-Universität Bonn, Germany. June 7, 2012
[7] 张立和, 杨义先, 钮心忻, 牛少彰. 软件水印综述[J]. 软件学报, 2003,14(2): 268~277.
[8] Wu Zhou, Yajin Zhou, Xuxian Jiang, and Peng Ning. DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces[C]. In Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY ’12, February 2012.
[9] Jonathan Crussell, Clint Gibler, and Hao Chen. Attack of the Clones: Detecting Cloned Applications on Android Markets[C]. In 17th European Symposium on Research in Computer Security, ESORICS 2012, September 2012.
[10] Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang, and Shihong Zou. Fast, Scalable Detection of Piggybacked Mobile Applications[C]. In Proceedings of the 3nd ACM Conference on Data and Application Security and Privacy, CODASPY ’13,