안드로이드 환경에서 자바 리플렉션과 동적 로딩을 이용한 코드 은닉법
Vol. 25, No. 1, pp. 17-30,
2월.
2015
10.13089/JKIISC.2015.25.1.17, Full Text:
Keywords: Java reflection, Malware, Malicious Code, DES, Data encryption standard, Bytecode, copyright protection, Obfuscation, Intent, Intent filter, Class encryption, Dynamic keys, AndroidManifest
Abstract Statistics
Cite this article
10.13089/JKIISC.2015.25.1.17, Full Text:
Keywords: Java reflection, Malware, Malicious Code, DES, Data encryption standard, Bytecode, copyright protection, Obfuscation, Intent, Intent filter, Class encryption, Dynamic keys, AndroidManifest
Abstract Statistics
Cite this article
[IEEE Style]
J. Kim, N. Go, Y. Park, "A Code Concealment Method using Java Reflection and Dynamic Loading in Android," Journal of The Korea Institute of Information Security and Cryptology, vol. 25, no. 1, pp. 17-30, 2015. DOI: 10.13089/JKIISC.2015.25.1.17.
[ACM Style]
Jiyun Kim, Namhyeon Go, and Yongsu Park. 2015. A Code Concealment Method using Java Reflection and Dynamic Loading in Android. Journal of The Korea Institute of Information Security and Cryptology, 25, 1, (2015), 17-30. DOI: 10.13089/JKIISC.2015.25.1.17.