Soumettre la recherche
Mettre en ligne
How to distinguish the app was repackaged or not?
•
1 j'aime
•
958 vues
Carl Lu
Suivre
I think the experiment might has some mistake, but in general, it works.
Lire moins
Lire la suite
Technologie
Actualités & Politique
Affichage du diaporama
Signaler
Partager
Affichage du diaporama
Signaler
Partager
1 sur 34
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Basic reverse engineering steps about .apk file
Basic reverse engineering steps about .apk file
Carl Lu
ES6 Template Literal & Tag Function
ES6 Template Literal & Tag Function
Jae Nam Jung
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
cargillfilberto
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
drandy1
Genetic algorithm guided key generation in wireless communication (gakg)
Genetic algorithm guided key generation in wireless communication (gakg)
IJCI JOURNAL
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
monicafrancis71118
ICPSR - Complex Systems Models in the Social Sciences - Lab Session 3 - Profe...
ICPSR - Complex Systems Models in the Social Sciences - Lab Session 3 - Profe...
Daniel Katz
salesforce triggers interview questions and answers
salesforce triggers interview questions and answers
bhanuadmob
Recommandé
Basic reverse engineering steps about .apk file
Basic reverse engineering steps about .apk file
Carl Lu
ES6 Template Literal & Tag Function
ES6 Template Literal & Tag Function
Jae Nam Jung
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
cargillfilberto
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
drandy1
Genetic algorithm guided key generation in wireless communication (gakg)
Genetic algorithm guided key generation in wireless communication (gakg)
IJCI JOURNAL
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
monicafrancis71118
ICPSR - Complex Systems Models in the Social Sciences - Lab Session 3 - Profe...
ICPSR - Complex Systems Models in the Social Sciences - Lab Session 3 - Profe...
Daniel Katz
salesforce triggers interview questions and answers
salesforce triggers interview questions and answers
bhanuadmob
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Dimitris Kolovos
The Ring programming language version 1.10 book - Part 11 of 212
The Ring programming language version 1.10 book - Part 11 of 212
Mahmoud Samir Fayed
Automatic comparison of malware
Automatic comparison of malware
UltraUploader
Kamil witecki asynchronous, yet readable, code
Kamil witecki asynchronous, yet readable, code
Kamil Witecki
Symbolic Execution (introduction and hands-on)
Symbolic Execution (introduction and hands-on)
Emilio Coppa
ECG BASED REPORT.
ECG BASED REPORT.
Mehran University Of Engineering And Technology Jamshoro.
2. Characteristics of Algorithm.ppt
2. Characteristics of Algorithm.ppt
Noumanali748226
White box
White box
sephalika
White box
White box
Hasam Panezai
Webinar alain-2009-03-04-clamav
Webinar alain-2009-03-04-clamav
thc2cat
Exception handling in java
Exception handling in java
Khulna University of Engineering & Technology (KUET)
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
ijsptm
Clonedigger-Python
Clonedigger-Python
Sangharsh agarwal
Automatic binary deobfuscation
Automatic binary deobfuscation
UltraUploader
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
ijcisjournal
Deep Parameters Tuning for Android Mobile Apps
Deep Parameters Tuning for Android Mobile Apps
Davide De Chiara
Complete c programming presentation
Complete c programming presentation
nadim akber
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
DevaKumari Vijay
Static Code Analysis PHP[tek] 2023
Static Code Analysis PHP[tek] 2023
Scott Keck-Warren
data structures using C 2 sem BCA univeristy of mysore
data structures using C 2 sem BCA univeristy of mysore
ambikavenkatesh2
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Contenu connexe
Similaire à How to distinguish the app was repackaged or not?
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Dimitris Kolovos
The Ring programming language version 1.10 book - Part 11 of 212
The Ring programming language version 1.10 book - Part 11 of 212
Mahmoud Samir Fayed
Automatic comparison of malware
Automatic comparison of malware
UltraUploader
Kamil witecki asynchronous, yet readable, code
Kamil witecki asynchronous, yet readable, code
Kamil Witecki
Symbolic Execution (introduction and hands-on)
Symbolic Execution (introduction and hands-on)
Emilio Coppa
ECG BASED REPORT.
ECG BASED REPORT.
Mehran University Of Engineering And Technology Jamshoro.
2. Characteristics of Algorithm.ppt
2. Characteristics of Algorithm.ppt
Noumanali748226
White box
White box
sephalika
White box
White box
Hasam Panezai
Webinar alain-2009-03-04-clamav
Webinar alain-2009-03-04-clamav
thc2cat
Exception handling in java
Exception handling in java
Khulna University of Engineering & Technology (KUET)
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
ijsptm
Clonedigger-Python
Clonedigger-Python
Sangharsh agarwal
Automatic binary deobfuscation
Automatic binary deobfuscation
UltraUploader
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
ijcisjournal
Deep Parameters Tuning for Android Mobile Apps
Deep Parameters Tuning for Android Mobile Apps
Davide De Chiara
Complete c programming presentation
Complete c programming presentation
nadim akber
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
DevaKumari Vijay
Static Code Analysis PHP[tek] 2023
Static Code Analysis PHP[tek] 2023
Scott Keck-Warren
data structures using C 2 sem BCA univeristy of mysore
data structures using C 2 sem BCA univeristy of mysore
ambikavenkatesh2
Similaire à How to distinguish the app was repackaged or not?
(20)
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
The Ring programming language version 1.10 book - Part 11 of 212
The Ring programming language version 1.10 book - Part 11 of 212
Automatic comparison of malware
Automatic comparison of malware
Kamil witecki asynchronous, yet readable, code
Kamil witecki asynchronous, yet readable, code
Symbolic Execution (introduction and hands-on)
Symbolic Execution (introduction and hands-on)
ECG BASED REPORT.
ECG BASED REPORT.
2. Characteristics of Algorithm.ppt
2. Characteristics of Algorithm.ppt
White box
White box
White box
White box
Webinar alain-2009-03-04-clamav
Webinar alain-2009-03-04-clamav
Exception handling in java
Exception handling in java
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
Clonedigger-Python
Clonedigger-Python
Automatic binary deobfuscation
Automatic binary deobfuscation
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Deep Parameters Tuning for Android Mobile Apps
Deep Parameters Tuning for Android Mobile Apps
Complete c programming presentation
Complete c programming presentation
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
Static Code Analysis PHP[tek] 2023
Static Code Analysis PHP[tek] 2023
data structures using C 2 sem BCA univeristy of mysore
data structures using C 2 sem BCA univeristy of mysore
Dernier
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
Dernier
(20)
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
How to distinguish the app was repackaged or not?
1.
2.
3.
4.
5.
6.
Sample No. Keystore Code Modified 1 keystore_file_1 Original
code 2 keystore_file_2 No 3 keystore_file_2 Yes
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
3,360,586 – 3,360,376
= 210
19.
3,334,868 – 3,334,658
= 210
20.
21.
The diff result
of AndroidManifest.xml (sample1 and sample2).
22.
The diff result
of AndroidManifest.xml (sample1 and sample3).
23.
The diff result
of apktool.yml (sample1 and sample2).
24.
The diff result
of apktool.yml (sample1 and sample3).
25.
Take a look
at the smali code (sample1 and sample3).
26.
Take a look
at sample1 and sample3.
27.
Take a look
at sample1 and sample3.
28.
Take a look
at sample1 and sample3 (.apk).
29.
Take a look
at sample1 and sample3 (after extract).
30.
Take a look
at sample1 and sample3 (.dex file).
31.
Let’s look back
to our test sample: Sample No. Keystore Code Modified 1 keystore_file_1 Original code 2 keystore_file_2 No 3 keystore_file_2 Yes
32.
Let’s look back
to our test samples and make some conclusion… The different stuffs at each phase (based on sample1):
Télécharger maintenant