A code protection scheme by process memory relocation for android devices

Xiaosong Zhang, Yu An Tan, Changyou Zhang, Yuan Xue, Yuanzhang Li, Jun Zheng*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

22 Citations (Scopus)

Abstract

Android devices is emerging as a significant force for multimedia big data, which hold an enormous amount of information about the users. The security and privacy concerns have arisen as a salient area of inquiry since malicious attackers can use memory dump to extract privacy or sensitive data from these devices. This paper presents a code protection approach for Android devices which protects certain processes from memory acquisition by process memory relocation. The protected processes are relocated to the special memory area where the kernel is loaded, and thus these processes will be covered when android reboots and attackers can not recognize which protected programs have been performed on the devices. The experiment results show that the proposed approach disables forensics tools like FROST to obtain these processes and has little impact on the normal operation of the protected program. Compared with the similar methods, the proposed method can protect greater data quantity but it occupies no additional storage resources.

Original languageEnglish
Pages (from-to)11137-11157
Number of pages21
JournalMultimedia Tools and Applications
Volume77
Issue number9
DOIs
Publication statusPublished - May 2018

Keywords

  • Android
  • Anti-forensics
  • Code protection
  • Memory acquisition
  • Process memory relocation

Fingerprint

Dive into the research topics of 'A code protection scheme by process memory relocation for android devices'. Together they form a unique fingerprint.

Cite this