Skip to main content

Android Methods Hooking Detection Using Dalvik Code and Dynamic Reverse Engineering by Stack Trace Analysis

  • Conference paper
  • First Online:
Theory and Applications of Dependable Computer Systems (DepCoS-RELCOMEX 2020)

Abstract

This research paper is focused on the issue of method hooking detection which in most of the existing solutions is focused on detection of the framework itself without checking of its real usage. The Authors proposed an algorithm that compares Dalvik bytecode from the application file with the stack trace of the executed code. Detection of the flow which is not a part of the app can be application method hooking. In this paper, the Authors ty to confirm it the concept can be used as a practical solution for the detection of this dynamic application tampering.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Szczepanik, M., Jóźwiak, I.J., Jamka, T., Stasiński, K.: Security lock system for mobile devices based on fingerprint recognition algorithm. In: Świątek, J., Borzemski, L., Grzech, A., Wilimowska, Z. (eds.) Proceedings of 36th International Conference on Information Systems Architecture and Technology – ISAT 2015 – Part III. Advances in Intelligent Systems and Computing, vol 431. Springer, Cham (2016)

    Google Scholar 

  2. Elenkov, N.: Android Security Internals: An In-Depth Guide to Android’s Security Architecture, 1st edn. No Starch Press, San Francisco (2014)

    Google Scholar 

  3. Vidas, T., Nicolas C.: Evading android runtime analysis via sandbox detection. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. ACM. (2014)

    Google Scholar 

  4. Lim, K., Jeong, Y., Cho, S., Park, M., Han, S.: An android application protection scheme against dynamic reverse engineering attacks. JoWUA 7, 40–52 (2016)

    Google Scholar 

  5. Lim, K., Jeong, J., Cho, S. J., Choi, J., Park, M., Han, S., Jhang, S.: An anti-reverse engineering technique using native code and obfuscator-LLVM for android applications. In: Proceedings of the International Conference on Research in Adaptive and Convergent Systems (RACS 2017). Association for Computing Machinery, New York, NY, USA, pp. 217–221 (2017)

    Google Scholar 

  6. Park, J.K., Choi, S.Y.: Studying security weaknesses of android system. Int. J. Secur. Appl. 9(3), 7–12 (2015)

    Google Scholar 

  7. Costamagna, V., Zheng, C.: ARTDroid: a virtual-method hooking framework on android ART runtime. In: IMPS@ ESSoS, pp. 20–28 (2016)

    Google Scholar 

  8. Mitul, B., Hinaxi, P., Swati, K.: A survey permission based mobile malware detection. Int. J. Comput. Technol. Appl. 6, 2 (2015)

    Google Scholar 

  9. Jang, W.J., Cho, S.W., Lee, H.W., Ju, H.I., Kim, J.N.: Rooting attack detection method on the Android-based smart phone. In: Proceedings of 2011 International Conference on Computer Science and Network Technology, Harbin, pp. 477–481 (2011)

    Google Scholar 

  10. Szczepanik, M., Jóźwiak, I.: Security of mobile banking applications. In: Kościelny, J., Syfert, M., Sztyber, A. (eds.) Advanced Solutions in Diagnostics and Fault Tolerant Control. DPS 2017. Advances in Intelligent Systems and Computing, vol 635. Springer, Cham (2018)

    Google Scholar 

  11. Gallo, R., Hongo P., Dahab, R., Navarro, L., Kawakami, H., Galvão, K., Junqueira, G., Ribeiro, L.: Security and system architecture: comparison of Android customizations. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (2015)

    Google Scholar 

  12. Xposed Framework. https://xposed.info/. Accessed 10 Jan 2020

  13. Gotta hack‘em all, Meet_Mobile Group meetup (2016). https://www.meetup.com/meet-mobile/events/232943997/. Accessed 10 Jan 2020

  14. Guardsquare Homepage. https://www.guardsquare.com/en. Accessed 10 Jan 2020

  15. Kedziora, M., Gawin, P., Szczepanik, M., Jozwiak, I.: Malware detection using machine learning algorithms and reverse engineering of android java code (2019)

    Article  Google Scholar 

  16. Xposed Module Repository. https://repo.xposed.info/. Accessed 10 Jan 2020

  17. XDA Developers Portal. https://www.xda-developers.com/. Accessed 10 Jan 2020

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michał Szczepanik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Szczepanik, M., Kędziora, M., Jóźwiak, I. (2020). Android Methods Hooking Detection Using Dalvik Code and Dynamic Reverse Engineering by Stack Trace Analysis. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Theory and Applications of Dependable Computer Systems. DepCoS-RELCOMEX 2020. Advances in Intelligent Systems and Computing, vol 1173. Springer, Cham. https://doi.org/10.1007/978-3-030-48256-5_62

Download citation

Publish with us

Policies and ethics