Implementing Android App Hardening Detector and Analyzing Status of App Protection 


Vol. 44,  No. 6, pp. 1084-1091, Jun.  2019
10.7840/kics.2019.44.6.1084


PDF
  Abstract

With the Android app market exploding, security threats to Android apps are on the rise. To minimize security threats, academic researches have been proposed to analyze app security. However, the number and the scope of apps have been limited on the research. Furthermore, there is a lack of research about systems that detect security features applied to apps. This paper proposes a system to assess the security of Android apps and reveals that the app ecosystem is vulnerable. The proposed system detects five of the app hardenings applied to apps. Using our system, we analyzed the top 1,322 applications in sales. From the result, we found that 61.58% of the apps do not have any protection features, which exposes security threats, 88.51% are vulnerable to app modification, and 97.21% are vulnerable to memory manipulation through debugging.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

D. Jo and H. Choi, "Implementing Android App Hardening Detector and Analyzing Status of App Protection," The Journal of Korean Institute of Communications and Information Sciences, vol. 44, no. 6, pp. 1084-1091, 2019. DOI: 10.7840/kics.2019.44.6.1084.

[ACM Style]

Dongmin Jo and Hyoung-Kee Choi. 2019. Implementing Android App Hardening Detector and Analyzing Status of App Protection. The Journal of Korean Institute of Communications and Information Sciences, 44, 6, (2019), 1084-1091. DOI: 10.7840/kics.2019.44.6.1084.

[KICS Style]

Dongmin Jo and Hyoung-Kee Choi, "Implementing Android App Hardening Detector and Analyzing Status of App Protection," The Journal of Korean Institute of Communications and Information Sciences, vol. 44, no. 6, pp. 1084-1091, 6. 2019. (https://doi.org/10.7840/kics.2019.44.6.1084)