Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 2 SI
Page No. 3059 - 3066

Key Resources Integrity Verification Scheme on Android Platform

Authors : Yongzhen Li, Zhenzhen Wang and Hyung-Jin Mun

References

Anonymous, 2017. Java native interface. Wikimedia Foundation, Inc., San Francisco, California, USA. https://en.wikipedia.org/wiki/Java_Native_Interface

Budd, T., 1999. C++ for Java Programmers. Pearson Education, London, England, UK., ISBN:978-81-317-6472-5, Pages: 284.

Davies, D.W. and W.L. Price, 1980. The Application of Digital Signatures based on Public key Cryptosystems. National Physical Laboratory, Teddington, England, UK.,.

Felt, A.P., M. Finifter, E. Chin, S. Hanna and D. Wagner, 2011. A survey of mobile malware in the wild. Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, October 17, 2011, ACM, Chicago, Illinois, USA., ISBN:978-1-4503-1000-0, pp: 3-14.

Gordon, R., 1998. Essential JNI: Java Native Interface. Prentice-Hall, Upper Saddle River, New Jersey, USA., ISBN:9780136798958, Pages: 499.

Huang, H., S. Zhu, P. Liu and D. Wu, 2013. A Framework for Evaluating Mobile App Repackaging Detection Algorithms. In: Trust and Trustworthy Computing, Huth, M., N. Asokan, S. Capkun, I. Flechais and L. Coles-Kemp (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-38907-8, pp: 169-186.

Kent, S.T., 1980. Protecting externally supplied software in small computers. Ph.D Thesis, Massachusetts Institute of Technology Cambridge, Cambridge, Massachusetts.

Kim, Y.J., S.J. Cho, K.J. Kim, E.H. Hwang and S.H. Yoon et al., 2012. Benchmarking Java application using JNI and native C application on Android. Proceedings of the 12th International Conference on Control, Automation and Systems (ICCAS’12), October 17-21, 2012, IEEE, JeJu Island, South Korea, ISBN:978-1-4673-2247-8, pp: 284-288.

Lee, S. and J.W. Jeon, 2010. Evaluating performance of Android platform using native C for embedded systems. Proceedings of the International Conference on Control Automation and Systems (ICCAS), October 27-30, 2010, IEEE, Gyeonggi-do, South Korea, ISBN:978-1-4244-7453-0, pp: 1160-1163.

Lee, Y.H., P. Chandrian and B. Li, 2011. Efficient Java native interface for Android based mobile devices. Proceedings of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), November 16-18, 2011, IEEE, Changsha, China, ISBN:978-1-4577-2135-9, pp: 1202-1209.

Mitchell, C., D. Rush and M. Walker, 1989. A remark on hash functions for message authentication. Comput. Secur., 8: 55-58.
Direct Link  |  

Qian, Q., J. Cai, M. Xie and R. Zhang, 2016. Malicious behavior analysis for android applications. Intl. J. Netw. Secur., 18: 182-192.
Direct Link  |  

Ratabouil, S., 2015. Android NDK: Beginner’s Guide. Packt Publishing Ltd, Mumbai, India,.

Shu, J., J. Li, Y. Zhang and D. Gu, 2014. Android app protection via interpretation obfuscation. Proceedings of the IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC’14), August 24-27, 2014, IEEE, Dalian, China, ISBN:978-1-4799-5079-9, pp: 63-68.

Younan, Y., D. Pozza, F. Piessens and W. Joosen, 2006. Extended protection against stack smashing attacks without performance loss. Proceedings of the 22nd Annual Conference on Computer Security Applications (ACSAC'06), December 11-15, 2006, IEEE, Miami Beach, Florida, pp: 429-438.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved