Netinfo Security ›› 2026, Vol. 26 ›› Issue (2): 263-273.doi: 10.3969/j.issn.1671-1122.2026.02.007
Previous Articles Next Articles
CHENG Long, XIE Mengfei, WU Hongtao, FU Jianming(
)
Received:2025-03-25
Online:2026-02-10
Published:2026-02-23
CLC Number:
CHENG Long, XIE Mengfei, WU Hongtao, FU Jianming. A Compiler-Assisted odex File Rewriting Method[J]. Netinfo Security, 2026, 26(2): 263-273.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2026.02.007
| 应用包名 | 产物大小 /MB | 编译 时间/s | 编译额外时间/s | 重写 时间/s | 节约 时间 /s | 保存dex时间/s |
|---|---|---|---|---|---|---|
| com.baidu.netdisk | 699 | 52.36 | 14.31 | 4.09 | 33.96 | 0.88 |
| com.eg.android.AlipayGphone | 649 | 40.45 | 5.97 | 5.25 | 29.23 | 0.61 |
| com.ss.android.article.news | 630 | 42.50 | 7.27 | 2.24 | 32.97 | 0.81 |
| com.tencent.qqlive | 668 | 53.70 | 10.57 | 6.71 | 36.41 | 1.23 |
| com.tencent.qqmusic | 626 | 44.44 | 10.15 | 7.28 | 27.00 | 0.95 |
| tv.danmaku.bili | 585 | 43.95 | 11.12 | 3.39 | 29.43 | 1.04 |
| com.baidu.searchbox | 545 | 34.34 | 8.22 | 2.56 | 23.55 | 0.64 |
| com.smile.gifmaker | 553 | 43.64 | 3.69 | 2.24 | 37.71 | 1.01 |
| com.ss.android.article.lite | 531 | 35.14 | 4.81 | 1.58 | 28.74 | 0.69 |
| com.cat.readall | 535 | 39.06 | 7.10 | 2.07 | 29.89 | 0.68 |
| [1] | StatCounter. Operatign System Market Share Worldwide[EB/OL]. (2024-10-31)[2024-10-31]. https://gs.statcounter.com/os-market-share. |
| [2] |
MA Yun, LIU Xuanzhe, LIU Yi, et al. A Tale of Two Fashions: An Empirical Study on the Performance of Native Apps and Web Apps on Android[J]. IEEE Transactions on Mobile Computing, 2018, 17(5): 990-1003.
doi: 10.1109/TMC.2017.2756633 URL |
| [3] | MA Sijun, XIAO Rong, CHENG Jiangwei. Research on Performance Data Acquisition Probe of Android Application[J]. Computer Applications and Software, 2017, 34(7): 192-197. |
| 马思峻, 肖荣, 成江伟. Android应用性能数据采集探针研究[J]. 计算机应用与软件, 2017, 34(7): 192-197. | |
| [4] |
VISOCHAN A, STROGANOV A, TITARENKO I, et al. Method for Profile-Guided Optimization of Android Applications Using Random Forest[J]. IEEE Access, 2022, 10: 109652-109662.
doi: 10.1109/ACCESS.2022.3214971 URL |
| [5] | Google. Android Runtime and Dalvik[EB/OL]. (2024-04-26)[2024-10-31]. https://source.android.com/docs/core/runtime. |
| [6] | Google. Configure ART[EB/OL]. (2024-04-26)[2024-10-31]. https://source.android.com/docs/core/runtime/configure. |
| [7] | HARSHA K. How Many Apps Does the Average Person Have?[EB/OL]. (2023-06-16)[2024-10-31]. https://dataprot.net/statistics/how-many-apps-does-the-average-person-have/. |
| [8] | SMITHSON M, ELWAZEER K, ANAND K, et al. Static Binary Rewriting without Supplemental Information: Overcoming the Tradeoff between Coverage and Correctness[C]// IEEE. 2013 20th Working Conference on Reverse Engineering (WCRE). New York: IEEE, 2013: 52-61. |
| [9] | DI F A, PAYER M, AGOSTA G. Rev.ng: A Unified Binary Analysis Framework to Recover CFGs and Function Boundaries[C]// ACM. The 26th International Conference on Compiler Construction. New York: ACM, 2017: 131-141. |
| [10] | DINABURG A, RUEF A. Mcsema: Static Translation of x86 Instructions to LLVM IR[EB/OL]. (2024-04-26)[2024-10-31]. https://github.com/trailofbits/publications/tree/master/presentations/McSema%20-%20Static%20Translation%20of%20x86%20instructions%20to%20LLVM%20IR. |
| [11] | WANG Ruoyu, SHOSHITAISHVILI Y, BIANCHI A, et al. Ramblr: Making Reassembly Great Again[EB/OL]. (2017-10-05)[2024-10-31]. https://www.ndss-symposium.org/wp-content/uploads/2017/09/ndss2017_10-5_Wang_paper_0.pdf. |
| [12] | WANG Shuai, WANG Pei, WU Dinghao. Reassembleable Disassembling[EB/OL]. (2015-08-12)[2024-10-31]. https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-wang-shuai.pdf. |
| [13] | HISER J D, NGUYEN-TUONG A, CO M, et al. A Framework for Creating Binary Rewriting Tools (Short Paper)[C]// IEEE. 2014 Tenth European Dependable Computing Conference. New York: IEEE, 2014: 142-145. |
| [14] | WILLIAMS-KING D, KOBAYASHI H, WILLIAMS-KING K, et al. Egalito: Layout-Agnostic Binary Recompilation[C]// ACM. The Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2020: 133-147. |
| [15] | PARZEFALL F, DESHPANDE C, HETZELT F, et al. What You Trace Is What You Get: Dynamic Stack-Layout Recovery for Binary Recompilation[C]// ACM. The 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2. New York:ACM, 2024: 1250-1263. |
| [16] | DUCK G J, GAO Xiang, ROYCHOUDHURY A. Binary Rewriting without Control Flow Recovery[C]// ACM. The 41st ACM SIGPLAN Conference on Programming Language Design and Implementation. New York: ACM, 2020: 151-163. |
| [17] | DI B L, MOGHADDAS H, PAYER M. ARMore: Pushing Love Back Into Binaries[C]// USENIX. The 32nd USENIX Security Symposium (USENIX Security 23). Berkeley: USENIX, 2023: 6311-6328. |
| [18] | KOO H, CHEN Yaohui, LU Long, et al. Compiler-Assisted Code Randomization[C]// IEEE. 2018 IEEE Symposium on Security and Privacy (SP). New York: IEEE, 2018: 461-477. |
| [19] |
XIE Mengfei, LIN Yan, LUO Chenke, et al. PointerScope: Understanding Pointer Patching for Code Randomization[J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(4): 3019-3036.
doi: 10.1109/TDSC.2022.3203043 URL |
| [20] | Google. Dalvik Bytecode Format[EB/OL]. (2024-08-05)[2024-10-31]. https://source.android.com/docs/core/runtime/dalvik-bytecode. |
| [1] | ZHANG Guanghua, LI Guoyu, WANG He, LI Heng, WU Shaoguang. High-Confidence Vulnerability Detection in IoT Firmware Based on Taint Flow Analysis [J]. Netinfo Security, 2026, 26(2): 325-337. |
| [2] | ZHAO Jia, WANG Yanchun, MA Hongliang, LI Qi. Hierarchical Role-Based Encryption Scheme Based on Trusted Execution Environment [J]. Netinfo Security, 2026, 26(2): 315-324. |
| [3] | XU Pu, SUN Xinyi, ZHU Yonggen. A Method for Detecting Java Injection Vulnerabilities Based on Interprocedure Constant String Analysis [J]. Netinfo Security, 2026, 26(2): 304-314. |
| [4] | HU Hang, FENG Kai, TAN Jinglei, ZHANG Yuchen. Network Defense Decision-Making Method Based on Moran Process and Stochastic Evolutionary Game Model [J]. Netinfo Security, 2026, 26(2): 291-303. |
| [5] | GU Zhaojun, LI Li, SUI He. A Payload Generation Method for SQL Injection Vulnerability Detection Based on Large Language Models [J]. Netinfo Security, 2026, 26(2): 274-290. |
| [6] | HAN Yiliang, FENG Haokang, WU Xuguang, SUN Yuteng, WANG Yuanyuan. A Survey of Neural Network-Based Evaluation of Random Number Generators [J]. Netinfo Security, 2026, 26(2): 171-188. |
| [7] | LIN Tiantian, WANG Yitian, WANG Xiaohang, ZHU Ting, REN Kui. CCASim: Research on Performance Simulator for Arm Confidential Compute Architecture [J]. Netinfo Security, 2026, 26(2): 189-210. |
| [8] | TAO Ci, CHEN Haoran, CHEN Ping. A Directed Fuzz Testing Method for C Language Exception Handling Paths in Industrial Control Systems [J]. Netinfo Security, 2026, 26(2): 211-223. |
| [9] | CAO Renlong, HU Honggang. Gauss Sieve Quantum Circuit Design Method Based on Grover’s Algorithm [J]. Netinfo Security, 2026, 26(2): 224-235. |
| [10] | WANG Teng, FAN Kunwei, ZHANG Yao. A Fusion Scheme of Multi-Key Homomorphic Encryption and Differential Privacy for Distributed Learning [J]. Netinfo Security, 2026, 26(2): 236-250. |
| [11] | YANG Le, HE Huiyang, YOU Weijing, ZHANG Baitao, LIN Jingqiang. A Multiparty Private Set Intersection Protocol for Lightweight Clients [J]. Netinfo Security, 2026, 26(2): 251-262. |
| [12] | GUO Yi, LI Xuqing, ZHANG Zijiao, ZHANG Hongtao, ZHANG Liancheng, ZHANG Xiangli. A Review of Data Security Sharing Based on Blockchain [J]. Netinfo Security, 2026, 26(1): 1-23. |
| [13] | ZHENG Kaifa, LUO Zhenpeng, LIU Jiayi, LIU Zhiquan, WANG Ze, WU Yunkun. A Lightweight Dynamic Node Participation Scheme for Federated Learning Nodes Supporting Attribute Update [J]. Netinfo Security, 2026, 26(1): 102-114. |
| [14] | LI Dong, GAO Yuan, YU Junqing, ZENG Muhong, CHEN Junxin. Polymorphic Network Control and Security Monitor Based on P4 [J]. Netinfo Security, 2026, 26(1): 115-124. |
| [15] | DONG Jiayu, GAO Hongmin, MA Zhaofeng, LAI Guanhui. Research and Implementation of Multi-Signature Mechanism in Blockchain [J]. Netinfo Security, 2026, 26(1): 125-138. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||