Submit Search
Upload
How to distinguish the app was repackaged or not?
•
1 like
•
958 views
Carl Lu
Follow
I think the experiment might has some mistake, but in general, it works.
Read less
Read more
Technology
News & Politics
Report
Share
Report
Share
1 of 34
Download now
Download to read offline
Recommended
Basic reverse engineering steps about .apk file
Basic reverse engineering steps about .apk file
Carl Lu
ES6 Template Literal & Tag Function
ES6 Template Literal & Tag Function
Jae Nam Jung
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
cargillfilberto
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
drandy1
Genetic algorithm guided key generation in wireless communication (gakg)
Genetic algorithm guided key generation in wireless communication (gakg)
IJCI JOURNAL
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
monicafrancis71118
ICPSR - Complex Systems Models in the Social Sciences - Lab Session 3 - Profe...
ICPSR - Complex Systems Models in the Social Sciences - Lab Session 3 - Profe...
Daniel Katz
salesforce triggers interview questions and answers
salesforce triggers interview questions and answers
bhanuadmob
Recommended
Basic reverse engineering steps about .apk file
Basic reverse engineering steps about .apk file
Carl Lu
ES6 Template Literal & Tag Function
ES6 Template Literal & Tag Function
Jae Nam Jung
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
cargillfilberto
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
drandy1
Genetic algorithm guided key generation in wireless communication (gakg)
Genetic algorithm guided key generation in wireless communication (gakg)
IJCI JOURNAL
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
COMM 166 Final Research Proposal GuidelinesThe proposal should.docx
monicafrancis71118
ICPSR - Complex Systems Models in the Social Sciences - Lab Session 3 - Profe...
ICPSR - Complex Systems Models in the Social Sciences - Lab Session 3 - Profe...
Daniel Katz
salesforce triggers interview questions and answers
salesforce triggers interview questions and answers
bhanuadmob
Dialog Engine for Product Information
Dialog Engine for Product Information
Vamsee Chamakura
Review of an open source unit test tool- Cucumber_Presentation
Review of an open source unit test tool- Cucumber_Presentation
Jabeen Shazia Posses H1 B Visa (Jazz)
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Dimitris Kolovos
The Ring programming language version 1.10 book - Part 11 of 212
The Ring programming language version 1.10 book - Part 11 of 212
Mahmoud Samir Fayed
Automatic comparison of malware
Automatic comparison of malware
UltraUploader
Kamil witecki asynchronous, yet readable, code
Kamil witecki asynchronous, yet readable, code
Kamil Witecki
Symbolic Execution (introduction and hands-on)
Symbolic Execution (introduction and hands-on)
Emilio Coppa
ECG BASED REPORT.
ECG BASED REPORT.
Mehran University Of Engineering And Technology Jamshoro.
2. Characteristics of Algorithm.ppt
2. Characteristics of Algorithm.ppt
Noumanali748226
White box
White box
sephalika
White box
White box
Hasam Panezai
Webinar alain-2009-03-04-clamav
Webinar alain-2009-03-04-clamav
thc2cat
Exception handling in java
Exception handling in java
Khulna University of Engineering & Technology (KUET)
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
ijsptm
Clonedigger-Python
Clonedigger-Python
Sangharsh agarwal
Automatic binary deobfuscation
Automatic binary deobfuscation
UltraUploader
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
ijcisjournal
Deep Parameters Tuning for Android Mobile Apps
Deep Parameters Tuning for Android Mobile Apps
Davide De Chiara
Complete c programming presentation
Complete c programming presentation
nadim akber
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
DevaKumari Vijay
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
FIDO Alliance
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge
More Related Content
Similar to How to distinguish the app was repackaged or not?
Dialog Engine for Product Information
Dialog Engine for Product Information
Vamsee Chamakura
Review of an open source unit test tool- Cucumber_Presentation
Review of an open source unit test tool- Cucumber_Presentation
Jabeen Shazia Posses H1 B Visa (Jazz)
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Dimitris Kolovos
The Ring programming language version 1.10 book - Part 11 of 212
The Ring programming language version 1.10 book - Part 11 of 212
Mahmoud Samir Fayed
Automatic comparison of malware
Automatic comparison of malware
UltraUploader
Kamil witecki asynchronous, yet readable, code
Kamil witecki asynchronous, yet readable, code
Kamil Witecki
Symbolic Execution (introduction and hands-on)
Symbolic Execution (introduction and hands-on)
Emilio Coppa
ECG BASED REPORT.
ECG BASED REPORT.
Mehran University Of Engineering And Technology Jamshoro.
2. Characteristics of Algorithm.ppt
2. Characteristics of Algorithm.ppt
Noumanali748226
White box
White box
sephalika
White box
White box
Hasam Panezai
Webinar alain-2009-03-04-clamav
Webinar alain-2009-03-04-clamav
thc2cat
Exception handling in java
Exception handling in java
Khulna University of Engineering & Technology (KUET)
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
ijsptm
Clonedigger-Python
Clonedigger-Python
Sangharsh agarwal
Automatic binary deobfuscation
Automatic binary deobfuscation
UltraUploader
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
ijcisjournal
Deep Parameters Tuning for Android Mobile Apps
Deep Parameters Tuning for Android Mobile Apps
Davide De Chiara
Complete c programming presentation
Complete c programming presentation
nadim akber
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
DevaKumari Vijay
Similar to How to distinguish the app was repackaged or not?
(20)
Dialog Engine for Product Information
Dialog Engine for Product Information
Review of an open source unit test tool- Cucumber_Presentation
Review of an open source unit test tool- Cucumber_Presentation
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
Assessing the Use of Eclipse MDE Technologies in Open-Source Software Projects
The Ring programming language version 1.10 book - Part 11 of 212
The Ring programming language version 1.10 book - Part 11 of 212
Automatic comparison of malware
Automatic comparison of malware
Kamil witecki asynchronous, yet readable, code
Kamil witecki asynchronous, yet readable, code
Symbolic Execution (introduction and hands-on)
Symbolic Execution (introduction and hands-on)
ECG BASED REPORT.
ECG BASED REPORT.
2. Characteristics of Algorithm.ppt
2. Characteristics of Algorithm.ppt
White box
White box
White box
White box
Webinar alain-2009-03-04-clamav
Webinar alain-2009-03-04-clamav
Exception handling in java
Exception handling in java
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING ...
Clonedigger-Python
Clonedigger-Python
Automatic binary deobfuscation
Automatic binary deobfuscation
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Deep Parameters Tuning for Android Mobile Apps
Deep Parameters Tuning for Android Mobile Apps
Complete c programming presentation
Complete c programming presentation
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
Unit 2-data types,Variables,Operators,Conitionals,loops and arrays
Recently uploaded
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
FIDO Alliance
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
CzechDreamin
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
中 央社
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
Patrick Viafore
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
Stephanie Beckett
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
CzechDreamin
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
FIDO Alliance
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
FIDO Alliance
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
UXDXConf
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FIDO Alliance
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
FIDO Alliance
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
Mark Opanasiuk
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
Stephen Perrenod
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
marcuskenyatta275
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
Samy Fodil
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
IES VE
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
iSEO AI
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
UXDXConf
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
confluent
Recently uploaded
(20)
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
How to distinguish the app was repackaged or not?
1.
2.
3.
4.
5.
6.
Sample No. Keystore Code Modified 1 keystore_file_1 Original
code 2 keystore_file_2 No 3 keystore_file_2 Yes
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
3,360,586 – 3,360,376
= 210
19.
3,334,868 – 3,334,658
= 210
20.
21.
The diff result
of AndroidManifest.xml (sample1 and sample2).
22.
The diff result
of AndroidManifest.xml (sample1 and sample3).
23.
The diff result
of apktool.yml (sample1 and sample2).
24.
The diff result
of apktool.yml (sample1 and sample3).
25.
Take a look
at the smali code (sample1 and sample3).
26.
Take a look
at sample1 and sample3.
27.
Take a look
at sample1 and sample3.
28.
Take a look
at sample1 and sample3 (.apk).
29.
Take a look
at sample1 and sample3 (after extract).
30.
Take a look
at sample1 and sample3 (.dex file).
31.
Let’s look back
to our test sample: Sample No. Keystore Code Modified 1 keystore_file_1 Original code 2 keystore_file_2 No 3 keystore_file_2 Yes
32.
Let’s look back
to our test samples and make some conclusion… The different stuffs at each phase (based on sample1):
Download now