Android App Copy Protection Mechanism with Semi-trusted Loader

Kuo-Yu Tsai,

Abstract


In this paper, we propose an Android App copy protection mechanism with a semi-trusted loader. In the proposed mechanism, an Android App is composed of an APK (application package file) file and a JAR (Java archive) file. As a mobile device user wants to purchase an Android App from the market, he/she has to download the APK file from the market and installs the APK in his/her device. At the first execution time, the embedded semi-trusted loader will download the encrypted JAR file from the market, and the corresponding decryption key for the encrypted JAR file. Then, the semi-trusted loader decrypts the JAR file by using the decryption key, and further, executes the loading for all functionalities. After the loading, the semi-trusted loader will delete the decryption key and the JAR file, and then store the encrypted JAR file in the mobile device. After that, the semi-trusted loader only download the decryption key from the market as the mobile user wants to execute all functionalities of the App. We adopt the signature scheme to protect the embedded semi-trusted loader in our proposed mechanism. As the semi-trusted loader attempts to download the decryption key, the market verifies if the semi-trusted loader is modified by verifying the signature.

Citation Format:
Kuo-Yu Tsai, "Android App Copy Protection Mechanism with Semi-trusted Loader," Journal of Internet Technology, vol. 19, no. 1 , pp. 065-072, Jan. 2018.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Office of Library and Information Services, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 974301, Taiwan, R.O.C.
Tel: +886-3-931-7314  E-mail: jit.editorial@gmail.com