You are here:
Publication details
Android APK on-the-fly tampering
Authors | |
---|---|
Year of publication | 2016 |
Type | Article in Periodical |
Magazine / Source | Infocommunications Journal |
MU Faculty or unit | |
Citation | |
Field | Informatics |
Keywords | Android security; application security; application download; code injection; malware contamination |
Description | The Android operating system is widely deployed and relied upon by both providers and users of various applications. These applications get frequently downloaded from other sources than just Google Play. This makes Android and its application treatment a popular target for attackers. We first present an automated offline attack injecting a previously prepared code to a previously unseen Android application installation file (APK) in an automatic manner. Moreover, we present a novel transparent on-the-fly extension of our attack when a proxy server performs code injection during a new APK download. |
Related projects: |