• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

DLCDroid an android apps analysis framework to analyse the dynamically loaded code.

作者信息

Bhan Rati, Pamula Rajendra, Kumar K Susheel, Jyotish Nand Kumar, Tripathi Prasun Chandra, Faruki Parvez, Gajrani Jyoti

机构信息

School of Computing Science and Engineering, Galgotias University, Greater Noida, 203201, India.

Department of Computer Science and Engineering, Indian Institute of Technology (ISM), Dhanbad, 826004, India.

出版信息

Sci Rep. 2025 Jan 26;15(1):3292. doi: 10.1038/s41598-025-88003-6.

DOI:10.1038/s41598-025-88003-6
PMID:39865150
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11770144/
Abstract

To combat dynamically loaded code in anti-emulated environments, DLCDroid is an Android app analysis framework. DL-CDroid uses the reflection API to effectively identify information leaks due to dynamically loaded code within malicious apps, incorporating static and dynamic analysis techniques. The Dynamically Loaded Code (DLC) technique employs Java features to allow Android apps to dynamically expand their functionality at runtime. Unfortunately, malicious app developers often exploit DLC techniques to transform seemingly benign apps into malware once installed on real devices. Even the most sophisticated static analysis tools struggle to detect data breaches caused by DLC. Our analysis demonstrates that conventional tools areill-equipped to handle DLC. DLCDroid leverages dynamic code interposition techniques for API hooking to expose concealed malicious behavior without requiring modifications to the Android framework. DLCDroid can unveil suspicious behavior that remains hidden when relying solely on static analysis. We evaluate DLCDroid's performance using a dataset comprising real-world benign and malware apps from reputed repositories like VirusShare and the Google Play Store. Compared to state-of-the-art approaches, the results indicate a significant improvement in detecting sensitive information leaks, more than 95.6% caused by reflection API. Furthermore, we enhance DLCDroid's functionality by integrating it with an event-based trigger solution, making the framework more scalable and fully automated in its analysis process.

摘要
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/4d6202b8b513/41598_2025_88003_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/0d6ea7cfbb2a/41598_2025_88003_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/9b08690e2bf2/41598_2025_88003_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/d35faa103a1c/41598_2025_88003_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/4e8a6a503fab/41598_2025_88003_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/00ce95d481d1/41598_2025_88003_Figb_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/6a2cc9d9ef99/41598_2025_88003_Figc_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/a8203c13a7f9/41598_2025_88003_Figd_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/cd7c5f1f777a/41598_2025_88003_Fige_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/fc7817b55f93/41598_2025_88003_Figf_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/4d6202b8b513/41598_2025_88003_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/0d6ea7cfbb2a/41598_2025_88003_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/9b08690e2bf2/41598_2025_88003_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/d35faa103a1c/41598_2025_88003_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/4e8a6a503fab/41598_2025_88003_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/00ce95d481d1/41598_2025_88003_Figb_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/6a2cc9d9ef99/41598_2025_88003_Figc_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/a8203c13a7f9/41598_2025_88003_Figd_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/cd7c5f1f777a/41598_2025_88003_Fige_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/fc7817b55f93/41598_2025_88003_Figf_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6bc8/11770144/4d6202b8b513/41598_2025_88003_Fig4_HTML.jpg

相似文献

1
DLCDroid an android apps analysis framework to analyse the dynamically loaded code.
Sci Rep. 2025 Jan 26;15(1):3292. doi: 10.1038/s41598-025-88003-6.
2
An accurate approach to discriminate android colluded malware from single app malware using permissions intelligence.一种利用权限智能来区分安卓协同恶意软件和单个应用恶意软件的准确方法。
Sci Rep. 2025 Mar 28;15(1):10680. doi: 10.1038/s41598-025-86568-w.
3
A detection method for android application security based on TF-IDF and machine learning.基于 TF-IDF 和机器学习的安卓应用安全检测方法。
PLoS One. 2020 Sep 11;15(9):e0238694. doi: 10.1371/journal.pone.0238694. eCollection 2020.
4
Beyond the virus: a first look at coronavirus-themed Android malware.超越病毒:初探以冠状病毒为主题的安卓恶意软件。
Empir Softw Eng. 2021;26(4):82. doi: 10.1007/s10664-021-09974-4. Epub 2021 Jun 12.
5
A comparative study on HIPAA technical safeguards assessment of android mHealth applications.安卓移动健康应用程序的《健康保险流通与责任法案》技术保障评估的比较研究
Smart Health (Amst). 2022 Dec;26. doi: 10.1016/j.smhl.2022.100349. Epub 2022 Oct 8.
6
The rise of obfuscated Android malware and impacts on detection methods.混淆式安卓恶意软件的兴起及其对检测方法的影响。
PeerJ Comput Sci. 2022 Mar 9;8:e907. doi: 10.7717/peerj-cs.907. eCollection 2022.
7
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization.一种采用基于多头注意力的控制流跟踪和图像可视化混合方法的恶意软件检测系统。
J Cloud Comput (Heidelb). 2022;11(1):75. doi: 10.1186/s13677-022-00349-8. Epub 2022 Nov 3.
8
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning.基于 OpCode 级函数调用图的深度学习的安卓恶意软件分类。
Sensors (Basel). 2020 Jun 29;20(13):3645. doi: 10.3390/s20133645.
9
FSDroid:- A feature selection technique to detect malware from Android using Machine Learning Techniques: FSDroid.FSDroid:一种使用机器学习技术从安卓系统中检测恶意软件的特征选择技术:FSDroid。
Multimed Tools Appl. 2021;80(9):13271-13323. doi: 10.1007/s11042-020-10367-w. Epub 2021 Jan 14.
10
MADFU: An Improved Malicious Application Detection Method Based on Features Uncertainty.MADFU:一种基于特征不确定性的改进型恶意应用检测方法。
Entropy (Basel). 2020 Jul 20;22(7):792. doi: 10.3390/e22070792.

本文引用的文献

1
Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network.用于医疗保健智能手机网络信任管理的基于区块链的安全高效数据共享方案。
J Supercomput. 2023 Apr 26:1-42. doi: 10.1007/s11227-023-05272-6.
2
Detecting and classifying method based on similarity matching of Android malware behavior with profile.基于安卓恶意软件行为与配置文件相似度匹配的检测与分类方法
Springerplus. 2016 Mar 3;5:273. doi: 10.1186/s40064-016-1861-x. eCollection 2016.
3
An empirical analysis of land property lawsuits and rainfalls.
土地产权诉讼与降雨情况的实证分析
Springerplus. 2016 Jan 4;5:1. doi: 10.1186/s40064-015-1659-2. eCollection 2016.