Blog
About

115
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Two-factor Protection Scheme in Securing the Source Code of Android Applications

      , , , , ,

      Proceedings of the 2nd BCS International IT Conference 2014 (BCSIIT)

      BCS International IT Conference 2014

      9 - 10 March 2014

      Android applications, decompilation, reverse-engineering, piracy, encryption, JNI, assets protection

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          While Android has become most popular OS in mobile phone market, more and more Android app developers are suffering from intellectual property infringement because it’s easy to extract the assets stored in the Android apps and to decompile Android apps to Java source code. This issue also poses threats to users’ privacy. In this article we reviewed the existing protection approaches for the protection of the source code and assets in Android apps, demonstrated the reason why Java Native Interface (JNI) approach can help improve the protection provided by existing approaches, developed 4 Android demo apps with 2 experiments conducted to evaluate the effectiveness of protection provided by the combination of Encryption and JNI approaches.

          Related collections

          Author and article information

          Contributors
          Conference
          March 2014
          March 2014
          : 1-7
          Affiliations
          City University of Hong Kong
          Article
          10.14236/ewic/BCSIIT2014.7
          © Daniel TSE et al. Published by BCS Learning and Development Ltd. Proceedings of the 2nd BCS International IT Conference 2014, Abu Dhabi, United Arab Emirates

          This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

          Proceedings of the 2nd BCS International IT Conference 2014
          BCSIIT
          2
          Abu Dhabi, United Arab Emirates
          9 - 10 March 2014
          Electronic Workshops in Computing (eWiC)
          BCS International IT Conference 2014
          Product
          Product Information: 1477-9358BCS Learning & Development
          Self URI (journal page): https://ewic.bcs.org/
          Categories
          Electronic Workshops in Computing

          Comments

          Comment on this article