Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART

The runtime system for the Android platform has changed to ART. ART differs from previously used Dalvik in that it is to be a runtime environment for the application’s machine code. As a result, ART does not execute Dalvik bytecode through an interpreter but executes the machine code itself, leading...

Full description

Bibliographic Details
Main Authors: Geonbae Na, Jongsu Lim, Kyoungmin Kim, Jeong Hyun Yi
Format: Article
Language:English
Published: Innovative Information Science & Technology Research Group (ISYOU) 2016-08-01
Series:Journal of Internet Services and Information Security
Subjects:
Online Access:http://isyou.info/jisis/vol6/no3/jisis-2016-vol6-no3-02.pdf
id doaj-d0c34abc23804f5cbe44c224fe5400a8
record_format Article
spelling doaj-d0c34abc23804f5cbe44c224fe5400a82020-11-24T22:56:53ZengInnovative Information Science & Technology Research Group (ISYOU) Journal of Internet Services and Information Security2182-20692182-20772016-08-01632739Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ARTGeonbae Na0Jongsu Lim1Kyoungmin Kim2Jeong Hyun Yi3Soongsil UniversitySoongsil UniversitySoongsil UniversitySoongsil UniversityThe runtime system for the Android platform has changed to ART. ART differs from previously used Dalvik in that it is to be a runtime environment for the application’s machine code. As a result, ART does not execute Dalvik bytecode through an interpreter but executes the machine code itself, leading to high performance and many other benefits. This change in runtime system also has many implications for mobile security. While we can anticipate with certainty the resurgence of modified malicious activity or malicious applications previously used with Dalvik or the emergence of completely new structures of malicious techniques, we can no longer ascertain the feasibility of the analysis techniques and analysis tools used against these malicious applications that operated in Dalvik. To combat future potential malicious techniques for ART, we must first have a clear understanding of ART and, with this foundation, to effectively and accurately utilize the correct analysis technique. Thus, this paper serves to introduce an analysis on the operating method and architecture of ART and, based on this information, address the executable feasibility of the analysis techniques in ART. Furthermore, we present the test results of running these analysis tools and techniques in ART.http://isyou.info/jisis/vol6/no3/jisis-2016-vol6-no3-02.pdfAndroid runtimereverse engineeringdynamic analysis
collection DOAJ
language English
format Article
sources DOAJ
author Geonbae Na
Jongsu Lim
Kyoungmin Kim
Jeong Hyun Yi
spellingShingle Geonbae Na
Jongsu Lim
Kyoungmin Kim
Jeong Hyun Yi
Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART
Journal of Internet Services and Information Security
Android runtime
reverse engineering
dynamic analysis
author_facet Geonbae Na
Jongsu Lim
Kyoungmin Kim
Jeong Hyun Yi
author_sort Geonbae Na
title Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART
title_short Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART
title_full Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART
title_fullStr Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART
title_full_unstemmed Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART
title_sort comparative analysis of mobile app reverse engineering methods on dalvik and art
publisher Innovative Information Science & Technology Research Group (ISYOU)
series Journal of Internet Services and Information Security
issn 2182-2069
2182-2077
publishDate 2016-08-01
description The runtime system for the Android platform has changed to ART. ART differs from previously used Dalvik in that it is to be a runtime environment for the application’s machine code. As a result, ART does not execute Dalvik bytecode through an interpreter but executes the machine code itself, leading to high performance and many other benefits. This change in runtime system also has many implications for mobile security. While we can anticipate with certainty the resurgence of modified malicious activity or malicious applications previously used with Dalvik or the emergence of completely new structures of malicious techniques, we can no longer ascertain the feasibility of the analysis techniques and analysis tools used against these malicious applications that operated in Dalvik. To combat future potential malicious techniques for ART, we must first have a clear understanding of ART and, with this foundation, to effectively and accurately utilize the correct analysis technique. Thus, this paper serves to introduce an analysis on the operating method and architecture of ART and, based on this information, address the executable feasibility of the analysis techniques in ART. Furthermore, we present the test results of running these analysis tools and techniques in ART.
topic Android runtime
reverse engineering
dynamic analysis
url http://isyou.info/jisis/vol6/no3/jisis-2016-vol6-no3-02.pdf
work_keys_str_mv AT geonbaena comparativeanalysisofmobileappreverseengineeringmethodsondalvikandart
AT jongsulim comparativeanalysisofmobileappreverseengineeringmethodsondalvikandart
AT kyoungminkim comparativeanalysisofmobileappreverseengineeringmethodsondalvikandart
AT jeonghyunyi comparativeanalysisofmobileappreverseengineeringmethodsondalvikandart
_version_ 1725652884655177728