Next Article in Journal
A Novel Frequency Domain Impedance Sensor with a Perforated Cylinder Coaxial Design for In-Situ Measuring Soil Matric Potential
Next Article in Special Issue
Special Issue “Internet of Things for Smart Homes”
Previous Article in Journal
Using Wearable and Non-Invasive Sensors to Measure Swallowing Function: Detection, Verification, and Clinical Application
Previous Article in Special Issue
MGF-Based Mutual Approximation of Hybrid Fading: Performance of Wireless/Power Line Relaying Communication for IoT
Open AccessArticle

Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART

School of Computer Science and Engineering, Soongsil University, Seoul 06978, Korea
School of Software, Soongsil University, Seoul 06978, Korea
Author to whom correspondence should be addressed.
Sensors 2019, 19(11), 2625;
Received: 31 March 2019 / Revised: 30 May 2019 / Accepted: 6 June 2019 / Published: 10 June 2019
(This article belongs to the Special Issue Internet of Things for Smart Homes)
As interest in Internet of Things environments rapidly increases throughout the IT convergence field, compatibility with mobile devices must be provided to enable personalized services. The security of mobile platforms and applications is critical because security vulnerabilities of mobile devices can be spread to all things in these environments. Android, the leading open mobile platform, has long used the Dalvik virtual machine as its runtime system. However, it has recently been completely replaced by a new runtime system, namely Android Runtime (ART). The change from Android’s Dalvik to ART means that the existing Dalvik bytecode-based application execution structure has been changed to a machine code-based application execution structure. Consequently, a detailed understanding of ART, such as new file formats and execution switching methods between codes, is required from the viewpoint of application security. In this paper, we demonstrate that an existing Dalvik-based application vulnerability can be exploited as-is in ART. This is because existing Dalvik executable files coexist in the ART executable file, and these Dalvik bytecodes and compiled machine codes have one-to-one mapping relationships. We then propose an ART-based application protection scheme to secure this by dynamically eliminating the one-to-one mapping. In addition, the proposed scheme is implemented to evaluate its reverse engineering resistance and performance through experiments. View Full-Text
Keywords: internet of things; reverse engineering; Dalvik; ART; mobile code protection internet of things; reverse engineering; Dalvik; ART; mobile code protection
Show Figures

Figure 1

MDPI and ACS Style

Na, G.; Lim, J.; Lee, S.; Yi, J.H. Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART. Sensors 2019, 19, 2625.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Search more from Scilit
Back to TopTop