Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART
The runtime system for the Android platform has changed to ART. ART differs from previously used Dalvik in that it is to be a runtime environment for the application’s machine code. As a result, ART does not execute Dalvik bytecode through an interpreter but executes the machine code itself, leading...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Innovative Information Science & Technology Research Group (ISYOU)
2016-08-01
|
Series: | Journal of Internet Services and Information Security |
Subjects: | |
Online Access: | http://isyou.info/jisis/vol6/no3/jisis-2016-vol6-no3-02.pdf |
id |
doaj-d0c34abc23804f5cbe44c224fe5400a8 |
---|---|
record_format |
Article |
spelling |
doaj-d0c34abc23804f5cbe44c224fe5400a82020-11-24T22:56:53ZengInnovative Information Science & Technology Research Group (ISYOU) Journal of Internet Services and Information Security2182-20692182-20772016-08-01632739Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ARTGeonbae Na0Jongsu Lim1Kyoungmin Kim2Jeong Hyun Yi3Soongsil UniversitySoongsil UniversitySoongsil UniversitySoongsil UniversityThe runtime system for the Android platform has changed to ART. ART differs from previously used Dalvik in that it is to be a runtime environment for the application’s machine code. As a result, ART does not execute Dalvik bytecode through an interpreter but executes the machine code itself, leading to high performance and many other benefits. This change in runtime system also has many implications for mobile security. While we can anticipate with certainty the resurgence of modified malicious activity or malicious applications previously used with Dalvik or the emergence of completely new structures of malicious techniques, we can no longer ascertain the feasibility of the analysis techniques and analysis tools used against these malicious applications that operated in Dalvik. To combat future potential malicious techniques for ART, we must first have a clear understanding of ART and, with this foundation, to effectively and accurately utilize the correct analysis technique. Thus, this paper serves to introduce an analysis on the operating method and architecture of ART and, based on this information, address the executable feasibility of the analysis techniques in ART. Furthermore, we present the test results of running these analysis tools and techniques in ART.http://isyou.info/jisis/vol6/no3/jisis-2016-vol6-no3-02.pdfAndroid runtimereverse engineeringdynamic analysis |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Geonbae Na Jongsu Lim Kyoungmin Kim Jeong Hyun Yi |
spellingShingle |
Geonbae Na Jongsu Lim Kyoungmin Kim Jeong Hyun Yi Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART Journal of Internet Services and Information Security Android runtime reverse engineering dynamic analysis |
author_facet |
Geonbae Na Jongsu Lim Kyoungmin Kim Jeong Hyun Yi |
author_sort |
Geonbae Na |
title |
Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART |
title_short |
Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART |
title_full |
Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART |
title_fullStr |
Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART |
title_full_unstemmed |
Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART |
title_sort |
comparative analysis of mobile app reverse engineering methods on dalvik and art |
publisher |
Innovative Information Science & Technology Research Group (ISYOU) |
series |
Journal of Internet Services and Information Security |
issn |
2182-2069 2182-2077 |
publishDate |
2016-08-01 |
description |
The runtime system for the Android platform has changed to ART. ART differs from previously used Dalvik in that it is to be a runtime environment for the application’s machine code. As a result, ART does not execute Dalvik bytecode through an interpreter but executes the machine code itself, leading to high performance and many other benefits. This change in runtime system also has many implications for mobile security. While we can anticipate with certainty the resurgence of modified malicious activity or malicious applications previously used with Dalvik or the emergence of completely new structures of malicious techniques, we can no longer ascertain the feasibility of the analysis techniques and analysis tools used against these malicious applications that operated in Dalvik. To combat future potential malicious techniques for ART, we must first have a clear understanding of ART and, with this foundation, to effectively and accurately utilize the correct analysis technique. Thus, this paper serves to introduce an analysis on the operating method and architecture of ART and, based on this information, address the executable feasibility of the analysis techniques in ART. Furthermore, we present the test results of running these analysis tools and techniques in ART. |
topic |
Android runtime reverse engineering dynamic analysis |
url |
http://isyou.info/jisis/vol6/no3/jisis-2016-vol6-no3-02.pdf |
work_keys_str_mv |
AT geonbaena comparativeanalysisofmobileappreverseengineeringmethodsondalvikandart AT jongsulim comparativeanalysisofmobileappreverseengineeringmethodsondalvikandart AT kyoungminkim comparativeanalysisofmobileappreverseengineeringmethodsondalvikandart AT jeonghyunyi comparativeanalysisofmobileappreverseengineeringmethodsondalvikandart |
_version_ |
1725652884655177728 |