A Strengthened Android Signature Management Method
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cho, Taenam | - |
dc.contributor.author | Seo, Seung-Hyun | - |
dc.date.accessioned | 2021-09-04T18:01:15Z | - |
dc.date.available | 2021-09-04T18:01:15Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2015-03-31 | - |
dc.identifier.issn | 1976-7277 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/94074 | - |
dc.description.abstract | Android is the world's most utilized smartphone OS which consequently, also makes it an attractive target for attackers. The most representative method of hacking used against Android apps is known as repackaging. This attack method requires extensive knowledge about reverse engineering in order to modify and insert malicious codes into the original app. However, there exists an easier way which circumvents the limiting obstacle of the reverse engineering. We have discovered a method of exploiting the Android code-signing process in order to mount a malware as an example. We also propose a countermeasure to prevent this attack. In addition, as a proof-of-concept, we tested a malicious code based on our attack technique on a sample app and improved the java libraries related to code-signing/verification reflecting our countermeasure. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | KSII-KOR SOC INTERNET INFORMATION | - |
dc.title | A Strengthened Android Signature Management Method | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Seo, Seung-Hyun | - |
dc.identifier.doi | 10.3837/tiis.2015.03.021 | - |
dc.identifier.scopusid | 2-s2.0-84926343826 | - |
dc.identifier.wosid | 000353109800021 | - |
dc.identifier.bibliographicCitation | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.9, no.3, pp.1210 - 1230 | - |
dc.relation.isPartOf | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | - |
dc.citation.title | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | - |
dc.citation.volume | 9 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 1210 | - |
dc.citation.endPage | 1230 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.identifier.kciid | ART002074966 | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Android | - |
dc.subject.keywordAuthor | Code-signing | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Malware | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.