Research Article

Enhanced Android App-Repackaging Attack on In-Vehicle Network

Table 7

App analysis results using automatic vulnerability analysis tool.

ObfuscationDescription

string encryptionThe used string is replaced with an encrypted string, and a decryption method is added to the class file and the encrypted string is decrypted during runtime.
renamingThe classes, fields, and methods are renamed with meaningless names to make it difficult to analyze the decompiled source code.
control flowThe positions of commands in the code area of the class file are changed or trash commands are inserted to make it difficult to analyze flow during decompiling.
API hidingSensitive libraries are used or the method calling is hidden.
class encryptionA specific class file is encrypted and stored, and the dynamically decrypted code is run during runtime.