780
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Studying business & IT? Drive your professional career forwards with BCS books - for a 20% discount click here: shop.bcs.org

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Two-factor Protection Scheme in Securing the Source Code of Android Applications

      Published
      proceedings-article
      , , , , ,
      Proceedings of the 2nd BCS International IT Conference 2014 (BCSIIT)
      BCS International IT Conference 2014
      9 - 10 March 2014
      Android applications, decompilation, reverse-engineering, piracy, encryption, JNI, assets protection
      Bookmark

            Abstract

            While Android has become most popular OS in mobile phone market, more and more Android app developers are suffering from intellectual property infringement because it’s easy to extract the assets stored in the Android apps and to decompile Android apps to Java source code. This issue also poses threats to users’ privacy. In this article we reviewed the existing protection approaches for the protection of the source code and assets in Android apps, demonstrated the reason why Java Native Interface (JNI) approach can help improve the protection provided by existing approaches, developed 4 Android demo apps with 2 experiments conducted to evaluate the effectiveness of protection provided by the combination of Encryption and JNI approaches.

            Content

            Author and article information

            Contributors
            Conference
            March 2014
            March 2014
            : 1-7
            Affiliations
            [0001]City University of Hong Kong
            Article
            10.14236/ewic/BCSIIT2014.7
            f1752a38-ffde-4af5-aa15-1e5eb259a385
            © Daniel TSE et al. Published by BCS Learning and Development Ltd. Proceedings of the 2nd BCS International IT Conference 2014, Abu Dhabi, United Arab Emirates

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 2nd BCS International IT Conference 2014
            BCSIIT
            2
            Abu Dhabi, United Arab Emirates
            9 - 10 March 2014
            Electronic Workshops in Computing (eWiC)
            BCS International IT Conference 2014
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/BCSIIT2014.7
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            decompilation,reverse-engineering,JNI,piracy,encryption,assets protection,Android applications

            Comments

            Comment on this article