Reverse Engineering and Android Application Security
Keywords:
reverse, engineering, android, application, securityAbstract
Reverse engineering process in Android applications is, due to the fact that Android applications are interpreted, significantly simplified. The paper illustrates the ease of extraction of the resource files, as well as methods to circumvent the limitations of the encrypted source code. On the example of one Android application, presented are methods for reverse engineering using tools to decompile closed application binaries. The most common threats are described using some of the methods of reverse engineering, as well as methods of protection against such threats.
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work’s authorship and initial publication in this journal.
Provided they are the owners of the copyright to their work, authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository, in a journal or publish it in a book), with an acknowledgment of its initial publication in this journal.