Journal on Communications ›› 2021, Vol. 42 ›› Issue (6): 171-181.doi: 10.11959/j.issn.1000-436x.2021115

• Papers • Previous Articles     Next Articles

Android application privacy protection mechanism based on virtual machine bytecode injection

Yubo SONG1,2,3, Qi CHEN1,2,3, Rui SONG1,2,3, Aiqun HU3,4   

  1. 1 School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China
    2 Key Laboratory of Computer Network Technology of Jiangsu Province, Southeast University, Nanjing 211189, China
    3 Purple Mountain Laboratories, Nanjing 211189, China
    4 School of Information Science and Engineering, Southeast University, Nanjing 211189, China
  • Revised:2021-03-10 Online:2021-06-25 Published:2021-06-01
  • Supported by:
    The National Key Research and Development Program of China(2020YFE0200600);Jiangsu Province Key Laboratory of Network and Information Security(BM2003201)

Abstract:

To solve the abuse of the Android application permission mechanism, a method of Android application access control based on virtual machine bytecode injection technology was proposed.The security policy in the form of virtual machine bytecode was generated according to the user’s security requirement and usage scenario, and injected into the coding unit of Android application that involves dangerous permission request and sensitive data access, to realize dynamic application behavior control.Tests on applications crawled from four mainstream domestic App stores show that the method can effectively intercept sensitive API calls and dangerous permission requests of legitimate App programs and implement control according to pre-specified security policies.Also, after injecting virtual machine bytecode, most of the App program operation is not affected by the injected code, and the robustness is guaranteed.The proposed method has a good universality.

Key words: Android security, privacy protection, security strategy, virtual machine bytecode

CLC Number: 

No Suggested Reading articles found!