안드로이드 덱스클래스로더 실행흐름 변경을 통한 원본 앱 노출 방지 기법
Vol. 27, No. 6, pp. 1271-1280,
12월.
2017
10.13089/JKIISC.2017.27.6.1271,
Full Text:
Keywords: Packer, DexClassLoader, Hooking, File System, Load, Substitution
Abstract Statistics
Cite this article


Keywords: Packer, DexClassLoader, Hooking, File System, Load, Substitution
Abstract Statistics
Cite this article
[IEEE Style]
H. Jo, J. Choi, D. Ha, J. Shin, H. Oh, "A Hiding Original App Method by Altering Android DexClassLoader Execution Flow," Journal of The Korea Institute of Information Security and Cryptology, vol. 27, no. 6, pp. 1271-1280, 2017. DOI: 10.13089/JKIISC.2017.27.6.1271.
[ACM Style]
Honglae Jo, Joontae Choi, Dongsoo Ha, Jinseop Shin, and Heekuck Oh. 2017. A Hiding Original App Method by Altering Android DexClassLoader Execution Flow. Journal of The Korea Institute of Information Security and Cryptology, 27, 6, (2017), 1271-1280. DOI: 10.13089/JKIISC.2017.27.6.1271.