Peng Tao, Lü Xinghang, Tang Junwei, Zhang Zili, Liu Junping, Hu Xinrong, He Ruhan, Wu Zhonghua. AUTOMATIC DETECTION SYSTEM FOR ANDROID DEX INJECTION VULNERABILITY CAUSED BY HOT UPDATE[J]. Computer Applications and Software, 2025, 42(3): 363-370,391. DOI: 10.3969/j.issn.1000-386x.2025.03.051
Citation: Peng Tao, Lü Xinghang, Tang Junwei, Zhang Zili, Liu Junping, Hu Xinrong, He Ruhan, Wu Zhonghua. AUTOMATIC DETECTION SYSTEM FOR ANDROID DEX INJECTION VULNERABILITY CAUSED BY HOT UPDATE[J]. Computer Applications and Software, 2025, 42(3): 363-370,391. DOI: 10.3969/j.issn.1000-386x.2025.03.051

AUTOMATIC DETECTION SYSTEM FOR ANDROID DEX INJECTION VULNERABILITY CAUSED BY HOT UPDATE

  • During the process of pushing patch packages for Android application hot updates, as no digital signature is added, attackers can hijack and tamper with the dex file, leading to dex injection with serious consequences. To address the above problems, an automatic detection system Homide based on mitmproxy is proposed. It used mitmproxy to obtain all the packets interacted between the client and the server, while locating the dex file. It injected code into the dex and pushed it to the client for execution using a man-in-the-middle attack. The log information output by the application was used to verify whether there was a dex injection vulnerability. For 513 applications in the application market, Homide successfully detected 17 new applications with dex injection. The experimental results show that Homide can effectively detect real-world applications with dex injection due to hot updates.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return