dc.contributor.author |
Shoaib, Muhammad |
|
dc.date.accessioned |
2020-10-28T11:14:57Z |
|
dc.date.available |
2020-10-28T11:14:57Z |
|
dc.date.issued |
2015 |
|
dc.identifier.uri |
http://10.250.8.41:8080/xmlui/handle/123456789/6672 |
|
dc.description |
Supervisor: Dr. Abdul Ghafoor Abbasi |
en_US |
dc.description.abstract |
The global smartphone market is growing at a brisk pace and Android, an open source platform of Google has become one of the most popular mobile operating systems. Android apps generate lot of revenue which is increasing every year. The reverse engineering of Android applications is much easier owing to the use of open source platform. Therefore, it becomes important to protect applications running on Android from attacks like Break Once Run Everywhere (BORE), tampering, illegal use and distribution. The goal is to minimize software flaws by using anti-reverse engineering techniques. In this paper, we present a protection scheme based on obfuscation, code modification and cryptographic protection. The combination of these protection techniques in a single solution can effectively counter reverse engineering on the Android platform. Our approach makes it tough for an attacker to get the business logic performed by an Android application such that the resources and time expended in reverse engineering would be more than are required in building a new application. |
en_US |
dc.publisher |
SEECS, National University of Science & Technology |
en_US |
dc.subject |
Smart Card, Dalvik Bytecode, Dynamically Loadable, Android, |
en_US |
dc.title |
Smart Card Based Protection for Dalvik Bytecode – Dynamically Loadable Component of an Android APK |
en_US |
dc.type |
Thesis |
en_US |