Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART
The runtime system for the Android platform has changed to ART. ART differs from previously used Dalvik in that it is to be a runtime environment for the application’s machine code. As a result, ART does not execute Dalvik bytecode through an interpreter but executes the machine code itself, leading...
Main Authors: | Geonbae Na, Jongsu Lim, Kyoungmin Kim, Jeong Hyun Yi |
---|---|
Format: | Article |
Language: | English |
Published: |
Innovative Information Science & Technology Research Group (ISYOU)
2016-08-01
|
Series: | Journal of Internet Services and Information Security |
Subjects: | |
Online Access: | http://isyou.info/jisis/vol6/no3/jisis-2016-vol6-no3-02.pdf |
Similar Items
-
Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART
by: Geonbae Na, et al.
Published: (2019-06-01) -
Performance Evaluation of Kotlin and Java on Android Runtime
by: Schwermer, Patrik
Published: (2018) -
ART vs. NDK vs. GPU acceleration: A study of performance of image processing algorithms on Android
by: Pålsson, Andreas
Published: (2017) -
Android Application Protection against Static Reverse Engineering based on Multidexing
by: Nak Young Kim, et al.
Published: (2016-11-01) -
Smali<sup>+</sup>: an Operational Semantics for Low-level Code Generated from Reverse Engineering Android Applications<sup>+</sup>
by: Marwa Ziadia, et al.
Published: (2020-02-01)