DexDefender: A DEX Protection Scheme to Withstand Memory Dump Attack Based on Android Platform

Release Date:2018-10-23  Author:RONG Yu, LIU Yiyi, LI Hui, and WANG Wei  Click:

[Abstract] Since Dalvik Executable (DEX) files are prone to be reversed to the Java source code using some decompiling tools, how to protect the DEX files from attackers becomes an important research issue. The traditional way to protect the DEX files from reverse engineering is to encrypt the entire DEX file, but after the complete plain code has been loaded into the memory while the application is running, the attackers can retrieve the code by using memory dump attack. This paper presents a novel DEX protection scheme to withstand memory dump attack on the Android platform with the name of DexDefender, which adopts the dynamic class⁃restoration method to ensure that the complete plain DEX data not appear in the memory while the application is being loaded into the memory. Experimental results show that the proposed scheme can protect the DEX files from both reverse engineering and memory dump attacks with an acceptable performance.

[Keywords] Android; DEX; memory dump; reverse engineering

Share:

 Select Country/Language

Global - English China - 中文