Android APK on-the-fly tampering

Investor logo

Warning

This publication doesn't include Faculty of Sports Studies. It includes Faculty of Informatics. Official publication website can be found on muni.cz.
Authors

ŘÍHA Zdeněk KLINEC Dušan MATYÁŠ Václav

Year of publication 2016
Type Article in Periodical
Magazine / Source Infocommunications Journal
MU Faculty or unit

Faculty of Informatics

Citation
Field Informatics
Keywords Android security; application security; application download; code injection; malware contamination
Description The Android operating system is widely deployed and relied upon by both providers and users of various applications. These applications get frequently downloaded from other sources than just Google Play. This makes Android and its application treatment a popular target for attackers. We first present an automated offline attack injecting a previously prepared code to a previously unseen Android application installation file (APK) in an automatic manner. Moreover, we present a novel transparent on-the-fly extension of our attack when a proxy server performs code injection during a new APK download.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.

More info