ApkArmor: Low-Cost Lightweight Anti-Decompilation Techniques for Android Apps
This program is tentative and subject to change.
Android app security is a critical concern for the software industry, with companies investing significantly in protecting their intellectual property from reverse engineering attacks. While commercial protection tools exist to prevent decompilation and unauthorized code access, they pose substantial challenges for businesses: high licensing costs ranging from thousands to tens of thousands of dollars annually, significant performance overhead that impacts user experience and app ratings, and increased app size that affects download rates. These limitations particularly burden small to medium-sized enterprises and independent developers, creating an urgent industry need for cost-effective protection solutions.
To address these challenges, we propose a novel file format-based anti-decompilation strategy that systematically exploits structural vulnerabilities in APK files. Building upon this strategy, we have developed \tool{}, a lightweight and cost-effective anti-decompilation framework that exploits inherent vulnerabilities in popular reverse engineering tools. Through systematic analysis, we first identified critical weaknesses in common decompilation tools’ parsing mechanisms and structural assumptions. Based on these findings, we developed seven mutation-based protection strategies that deliberately trigger these vulnerabilities by introducing specific structural anomalies into APK files and the AndroidManifest.xml. These methods include Countermeasures against Dirty Code and Corrupted Payloads (CACoP), Pseudo-Encryption (PE), Using Unknown Compression Method (UUCM), Unavailable Magic Value (UMA), Modify the Offset Field in stringChunk (MOFS), and Dirty Bytecode Replacement of ``Android'' (DRA). We evaluated our exploitation strategies through extensive experiments on 100 randomly selected Android apps, testing against the latest versions of three widely used decompilation tools: JADX (v1.5.1), APKTool (v2.11.0), and Androguard (v4.1.2). Our results demonstrate that PE and DRA achieved complete protection by successfully exploiting vulnerabilities present in all tested tools. MOFS, UUCM, and UNV effectively exploited weaknesses in APKTool and Androguard’s parsing mechanisms.
This program is tentative and subject to change.
Wed 19 NovDisplayed time zone: Seoul change
16:00 - 17:00 | |||
16:00 10mTalk | RAML: Toward Retrieval-Augmented Localization of Malicious Payloads in Android Apps NIER Track Tiezhu Sun University of Luxembourg, Marco Alecci University of Luxembourg, Yewei Song University of Luxembourg, Xunzhu Tang University of Luxembourg, Kisub Kim DGIST, Jordan Samhi University of Luxembourg, Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg | ||
16:10 10mTalk | Unlocking Reproducibility: Automating re-Build Process for Open-Source Software Industry Showcase Behnaz Hassanshahi Oracle, Trong Nhan Mai Oracle Labs, Benjamin Selwyn-Smith Oracle Labs, Nicholas Allen Oracle | ||
16:20 10mTalk | JSidentify-V2: Dynamic Memory Fingerprinting for Mini-Game Plagiarism Detection Industry Showcase Zhihao Li Tencent Inc., Chaozheng Wang The Chinese University of Hong Kong, Li Zongjie Hong Kong University of Science and Technology, Xinyong Peng Tencent Inc., Qun Xia Tencent Inc., Haochuan Lu Tencent, Ting Xiong Tencent Inc., Shuzheng Gao Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Shenzhen, Shuai Wang Hong Kong University of Science and Technology, Yuetang Deng Tencent, Huafeng Ma Tencent Inc. | ||
16:30 10mTalk | IDBFuzz: Web Storage DataBase Fuzzing with Controllable Semantics NIER Track Jingyi Chen Jiangsu University, Jinfu Chen Jiangsu University, Saihua Cai Jiangsu University, Shengran Wang Jiangsu University | ||
16:40 10mTalk | SCOPE: Evaluating and Enhancing Permission Explanation Transparency in Mobile Apps Industry Showcase Liu Wang Beijing University of Posts and Telecommunications, Tianshu Zhou Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, Xiyuan Liu Freshippo-Alibaba Group, Yi Wang | ||
16:50 10mTalk | ApkArmor: Low-Cost Lightweight Anti-Decompilation Techniques for Android Apps Industry Showcase Jiayang Liu Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Pengcheng Xia Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||