Skip to main content
Log in

Anti-debugging scheme for protecting mobile apps on android platform

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The Android application package file, APK file, can be easily decompiled using Android reverse engineering tools. Thus, general apps can be easily transformed into malicious application through reverse engineering and analysis. These repacked apps could be uploaded in general android app market called Google Play Store and redistributed. To prevent theses malicious behaviors such as malicious code injection or code falsifications, many techniques and tools were developed. However, these techniques also can be analyzed using debuggers. Also, analyzed apps can be tampered easily. For example, when applying anti-analysis techniques to android apps using Dexprotector which is commercial tool for protecting android app, it can be seen that these techniques can also be analyzed using debugger. In this paper, to protect the android app from the attack using debugger, we propose anti-debugging techniques for native code debugging and managed code debugging of android apps.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Android debug bridge. http://developer.android.com/tools/help/adb.html

  2. Android reverse engineering and defenses. https://bluebox.com/technical/bluebox-berlinsides-presentationbluebox-berlinsides-presentation/

  3. Bornstein D (2008) Dalvik vm internals. In: Google I/O developer conference, vol 23, pp 17–30

  4. Cesare S (1999) Linux anti-debugging techniques (fooling the debugger). Security focus

  5. Dex file. https://source.android.com/devices/tech/dalvik/dex-format.html

  6. Dexprotector by licel. http://dexprotector.com/

  7. Enck W, Octeau D, McDaniel P, Chaudhuri S (2011) A study of android application security. In: USENIX security symposium, vol 2, p 2

  8. Fengsheng Y (2011) Android internals: system

  9. Gagnon MN, Taylor S, Ghosh AK (2007) Software protection through anti-debugging. IEEE Secur Priv 5(3):82–84

    Article  Google Scholar 

  10. Huang J (2012) Understanding the dalvik virtual machine. Google Technology User Groups, Taipei

    Google Scholar 

  11. Ida pro disassembler and debugger. https://www.hex-rays.com/products/ida/. Accessed 26 Mar 2015

  12. Java debug wire protocol. http://docs.oracle.com/javase/7/docs/technotes/guides/jpda/jdwp-spec.html. Accessed 25 Mar 2015

  13. Java platform debugger architecture. http://docs.oracle.com/javase/7/docs/technotes/ guides/jpda. Accessed 25 Mar 2015

  14. Jung JH, Kim JY, Lee HC, Yi JH (2013) Repackaging attack on android banking applications and its countermeasures. Wirel Pers Commun 73(4):1421–1437

    Article  Google Scholar 

  15. Khan S, Khan S, Banuri H, Nauman M, Alam M (2009) Analysis of dalvik virtual machine and class path library. Tech. rep. Security Engineering Research Group, Institute of Management Sciences, Peshawar

  16. Lee C, Jeong YS, Cho SJ (2013) A method to protect android applications against reverse engineering. J Secur Eng 10(1):41–50

  17. Schallner M (2006) Beginners guide to basic linux anti anti debugging techniques. Code-Break Mag, Secur Anti-Secur Attack Def 1(2):3–10

  18. Schulz P (2012) Code protection in android. Rheinische Friedrich-Wilhelms-Universitgt Bonn, Institute of Computer Science, Bonn

    Google Scholar 

  19. Selvakumar G (2012) Constructing an environment and providing a performance assessment of androids dalvik virtual machine on x86 and arm. Ph.D. thesis, University of Kansas

Download references

Acknowledgments

This research was supported by Global Research Laboratory (GRL) program through the National Research Foundation of Korea (NRF-2014K1A1A2043029).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeong Hyun Yi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cho, H., Lim, J., Kim, H. et al. Anti-debugging scheme for protecting mobile apps on android platform. J Supercomput 72, 232–246 (2016). https://doi.org/10.1007/s11227-015-1559-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-015-1559-9

Keywords

Navigation