Your browser doesn't support javascript.
loading
An Android Inline Hooking Framework for the Securing Transmitted Data.
Tan, Yu-An; Feng, Shuo; Cheng, Xiaochun; Li, Yuanzhang; Zheng, Jun.
Afiliación
  • Tan YA; School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China.
  • Feng S; School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China.
  • Cheng X; Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou 510006, China.
  • Li Y; Department of Computer Science, Middlesex University, London NW4 4BE, UK.
  • Zheng J; School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China.
Sensors (Basel) ; 20(15)2020 Jul 28.
Article en En | MEDLINE | ID: mdl-32731597
Information leaks can occur through many Android applications, including unauthorized access to sensors data. Hooking is an important technique for protecting Android applications and add security features to them even without its source code. Various hooking frameworks are developed to intercept events and process their own specific events. The hooking tools for Java methods are varied, however, the native hook has few methods. Besides, the commonly used Android hook frameworks cannot meet the requirement of hooking the native methods in shared libraries on non-root devices. Even though some approaches are able to hook these methods, they have limitations or are complicated to implement. In the paper, a feasible hooking approach for Android native methods is proposed and implemented, which does not need any modifications to both the Android framework and app's code. In this approach, the method's reference address is modified and control flow is redirected. Beyond that, this study combines this approach with VirtualXposed which aims to run it without root privileges. This hooking framework can be used to enforce security policies and monitor sensitive methods in shared objects. The evaluation of the scheme demonstrates its capability to perform hook operation without a significant runtime performance overhead on real devices and it is compatible and functional for the native hook.
Palabras clave

Texto completo: 1 Colección: 01-internacional Banco de datos: MEDLINE Idioma: En Revista: Sensors (Basel) Año: 2020 Tipo del documento: Article País de afiliación: China

Texto completo: 1 Colección: 01-internacional Banco de datos: MEDLINE Idioma: En Revista: Sensors (Basel) Año: 2020 Tipo del documento: Article País de afiliación: China