More

PC conflicts

None

Submitted

[PDF] Submission 22 Dec 2018 12:14:14am AoE · 98f8efe0302d529836415f4322cba895cb5887b9ca56b80fb9814ee599b282b398f8efe0

To improve the execution performance of applications, Android introduced a new optimization technique using app cache files. However, this new feature also brings a new security concern called ``app cache tampering attack'' that can eventually change the behavior of installed applications by modifying the executable codes in their app cache files. We address this issue with ACIDroid, an efficient app cache integrity protection solution on Android, which relies on the selective transformation of the original DEX codes into the optimized DEX codes. To show the feasibility of ACIDroid, we performed app cache tampering attacks on 14 popular Android apps and tried to detect the changes in app cache files using ACIDroid. With the modified app cache files, ACIDroid was able to correctly detect the (intentional) changes while having an acceptable execution time overhead less than 5% of the total execution time.
J. Choi, S. Kim, K. Kim, J. Bae, T. Kim, S. Hong, H. Kim [details]

Jusop Choi (Sungkyunkwan University) <cjs1992@skku.edu>

Soolin Kim (Sungkyunkwan University) <soolinkim@skku.edu>

Kuyju Kim (Sungkyunkwan University) <kuyjukim@skku.edu>

Junhwi Bae (Sungkyunkwan University) <bjh0429@skku.edu>

Taeyun Kim (Sungkyunkwan University) <taeyun1010@skku.edu>

Seok Hong (Samsung Research) <seok85.hong@samsung.com>

Hyoungshick Kim (Sungkyunkwan University) <hyoung@skku.edu>

✓ Short Paper
  • Non-trivial targets (real-world binaries, embedded devices, beyond binary code).

To edit this submission, sign in using your email and password.