|Title:||Characterizing the evolving Android packers|
|Subject:||Android (Electronic resource)|
Application software -- Security measures
Hong Kong Polytechnic University -- Dissertations
|Department:||Department of Computing|
|Pages:||xiii, 93 pages : color illustrations|
|Abstract:||Back to the year 2007, the first version of Android is release. Today, Android has brought us a large variety of applications with varied quality. At least 3.04 million applications are now available on Google Play , while there are even more in other application markets/repositories . Meanwhile, plagiarists targeted Android applications because they are easy to reverse engineer. Application developers hence use packing techniques to hinder the reverse engineering process. On the other hand, publicly available online packing services have made themselves a breeding ground for packed malware. The security analysts therefore develop unpacking techniques to uncover packed applications and study their behavior. This is how the evolutionary process of packing and unpacking began. In this thesis, we first depict current landscape of packing and unpacking techniques. Then we go through the history of the battle of packing and unpacking. Thereafter, we elaborate in great detail packing and unpacking techniques in three generations, and propose a semantic recognition approach to enable deep inspection of the state-of-the-art packing technique, Virtual Machine Protection (VMP), for existing and future unpacking tools. At the end, we conclude our work and suggested directions for future research.|
|Rights:||All rights reserved|
Files in This Item:
|5866.pdf||For All Users (off-campus access for PolyU Staff & Students only)||1.18 MB||Adobe PDF||View/Open|
As a bona fide Library user, I declare that:
- I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
- I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
- I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.
Please use this identifier to cite or link to this item: