Enviar búsqueda
Cargar
How to distinguish the app was repackaged or not?
•
1 recomendación
•
958 vistas
Carl Lu
Seguir
I think the experiment might has some mistake, but in general, it works.
Leer menos
Leer más
Tecnología
Noticias y política
Denunciar
Compartir
Denunciar
Compartir
1 de 34
Descargar ahora
Descargar para leer sin conexión
Recomendados
Basic reverse engineering steps about .apk file
Basic reverse engineering steps about .apk file
Carl Lu
ES6 Template Literal & Tag Function
ES6 Template Literal & Tag Function
Jae Nam Jung
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
cargillfilberto
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
drandy1
Genetic algorithm guided key generation in wireless communication (gakg)
Genetic algorithm guided key generation in wireless communication (gakg)
IJCI JOURNAL
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
monicafrancis71118
ICPSR - Complex Systems Models in the Social Sciences - Lab Session 3 - Profe...
ICPSR - Complex Systems Models in the Social Sciences - Lab Session 3 - Profe...
Daniel Katz
salesforce triggers interview questions and answers
salesforce triggers interview questions and answers
bhanuadmob
Recomendados
Basic reverse engineering steps about .apk file
Basic reverse engineering steps about .apk file
Carl Lu
ES6 Template Literal & Tag Function
ES6 Template Literal & Tag Function
Jae Nam Jung
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
cargillfilberto
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
drandy1
Genetic algorithm guided key generation in wireless communication (gakg)
Genetic algorithm guided key generation in wireless communication (gakg)
IJCI JOURNAL
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
monicafrancis71118
ICPSR - Complex Systems Models in the Social Sciences - Lab Session 3 - Profe...
ICPSR - Complex Systems Models in the Social Sciences - Lab Session 3 - Profe...
Daniel Katz
salesforce triggers interview questions and answers
salesforce triggers interview questions and answers
bhanuadmob
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Dimitris Kolovos
The Ring programming language version 1.10 book - Part 11 of 212
The Ring programming language version 1.10 book - Part 11 of 212
Mahmoud Samir Fayed
Automatic comparison of malware
Automatic comparison of malware
UltraUploader
Kamil witecki asynchronous, yet readable, code
Kamil witecki asynchronous, yet readable, code
Kamil Witecki
Symbolic Execution (introduction and hands-on)
Symbolic Execution (introduction and hands-on)
Emilio Coppa
ECG BASED REPORT.
ECG BASED REPORT.
Mehran University Of Engineering And Technology Jamshoro.
2. Characteristics of Algorithm.ppt
2. Characteristics of Algorithm.ppt
Noumanali748226
White box
White box
sephalika
White box
White box
Hasam Panezai
Webinar alain-2009-03-04-clamav
Webinar alain-2009-03-04-clamav
thc2cat
Exception handling in java
Exception handling in java
Khulna University of Engineering & Technology (KUET)
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
ijsptm
Clonedigger-Python
Clonedigger-Python
Sangharsh agarwal
Automatic binary deobfuscation
Automatic binary deobfuscation
UltraUploader
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
ijcisjournal
Deep Parameters Tuning for Android Mobile Apps
Deep Parameters Tuning for Android Mobile Apps
Davide De Chiara
Complete c programming presentation
Complete c programming presentation
nadim akber
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
DevaKumari Vijay
Static Code Analysis PHP[tek] 2023
Static Code Analysis PHP[tek] 2023
Scott Keck-Warren
data structures using C 2 sem BCA univeristy of mysore
data structures using C 2 sem BCA univeristy of mysore
ambikavenkatesh2
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Más contenido relacionado
Similar a How to distinguish the app was repackaged or not?
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Dimitris Kolovos
The Ring programming language version 1.10 book - Part 11 of 212
The Ring programming language version 1.10 book - Part 11 of 212
Mahmoud Samir Fayed
Automatic comparison of malware
Automatic comparison of malware
UltraUploader
Kamil witecki asynchronous, yet readable, code
Kamil witecki asynchronous, yet readable, code
Kamil Witecki
Symbolic Execution (introduction and hands-on)
Symbolic Execution (introduction and hands-on)
Emilio Coppa
ECG BASED REPORT.
ECG BASED REPORT.
Mehran University Of Engineering And Technology Jamshoro.
2. Characteristics of Algorithm.ppt
2. Characteristics of Algorithm.ppt
Noumanali748226
White box
White box
sephalika
White box
White box
Hasam Panezai
Webinar alain-2009-03-04-clamav
Webinar alain-2009-03-04-clamav
thc2cat
Exception handling in java
Exception handling in java
Khulna University of Engineering & Technology (KUET)
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
ijsptm
Clonedigger-Python
Clonedigger-Python
Sangharsh agarwal
Automatic binary deobfuscation
Automatic binary deobfuscation
UltraUploader
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
ijcisjournal
Deep Parameters Tuning for Android Mobile Apps
Deep Parameters Tuning for Android Mobile Apps
Davide De Chiara
Complete c programming presentation
Complete c programming presentation
nadim akber
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
DevaKumari Vijay
Static Code Analysis PHP[tek] 2023
Static Code Analysis PHP[tek] 2023
Scott Keck-Warren
data structures using C 2 sem BCA univeristy of mysore
data structures using C 2 sem BCA univeristy of mysore
ambikavenkatesh2
Similar a How to distinguish the app was repackaged or not?
(20)
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
The Ring programming language version 1.10 book - Part 11 of 212
The Ring programming language version 1.10 book - Part 11 of 212
Automatic comparison of malware
Automatic comparison of malware
Kamil witecki asynchronous, yet readable, code
Kamil witecki asynchronous, yet readable, code
Symbolic Execution (introduction and hands-on)
Symbolic Execution (introduction and hands-on)
ECG BASED REPORT.
ECG BASED REPORT.
2. Characteristics of Algorithm.ppt
2. Characteristics of Algorithm.ppt
White box
White box
White box
White box
Webinar alain-2009-03-04-clamav
Webinar alain-2009-03-04-clamav
Exception handling in java
Exception handling in java
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
Clonedigger-Python
Clonedigger-Python
Automatic binary deobfuscation
Automatic binary deobfuscation
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Deep Parameters Tuning for Android Mobile Apps
Deep Parameters Tuning for Android Mobile Apps
Complete c programming presentation
Complete c programming presentation
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
Static Code Analysis PHP[tek] 2023
Static Code Analysis PHP[tek] 2023
data structures using C 2 sem BCA univeristy of mysore
data structures using C 2 sem BCA univeristy of mysore
Último
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
Último
(20)
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
How to distinguish the app was repackaged or not?
1.
2.
3.
4.
5.
6.
Sample No. Keystore Code Modified 1 keystore_file_1 Original
code 2 keystore_file_2 No 3 keystore_file_2 Yes
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
3,360,586 – 3,360,376
= 210
19.
3,334,868 – 3,334,658
= 210
20.
21.
The diff result
of AndroidManifest.xml (sample1 and sample2).
22.
The diff result
of AndroidManifest.xml (sample1 and sample3).
23.
The diff result
of apktool.yml (sample1 and sample2).
24.
The diff result
of apktool.yml (sample1 and sample3).
25.
Take a look
at the smali code (sample1 and sample3).
26.
Take a look
at sample1 and sample3.
27.
Take a look
at sample1 and sample3.
28.
Take a look
at sample1 and sample3 (.apk).
29.
Take a look
at sample1 and sample3 (after extract).
30.
Take a look
at sample1 and sample3 (.dex file).
31.
Let’s look back
to our test sample: Sample No. Keystore Code Modified 1 keystore_file_1 Original code 2 keystore_file_2 No 3 keystore_file_2 Yes
32.
Let’s look back
to our test samples and make some conclusion… The different stuffs at each phase (based on sample1):
Descargar ahora