Preventing Tampering Aplikasi Berbasis Android Menggunakan Openat System Call (studi Kasus: Signature Spoofing)preventing Tampering Aplikasi Berbasis Android Menggunakan Openat System Call (studi Kasus: Signature Spoofing)

Satria, Muhammad Rifqi Putra (2024) Preventing Tampering Aplikasi Berbasis Android Menggunakan Openat System Call (studi Kasus: Signature Spoofing)preventing Tampering Aplikasi Berbasis Android Menggunakan Openat System Call (studi Kasus: Signature Spoofing). Other thesis, Universitas Islam Riau.

[thumbnail of Muhammad Rifqi Putra Satria.pdf] Text
Muhammad Rifqi Putra Satria.pdf - Submitted Version
Restricted to Registered users only

Download (8MB) | Request a copy

Abstract

This study aims to enhance the Security of Android applications by developing an effective Signature verification algorithm. The identified issue reveals vulnerabilities in the Standard API that can be exploited by attackers to tamper with Android applications. Additionally, numerous cases indicate that applications are frequently compromised through Hook and Bypass techniques that manipulate the business logic of the applications. The adverse effects of tampering include the installation of harmful viruses for users and losses for developers. The objective of this research is to develop an effective algorithm to check and verify the Signature of Android applications and to test the efficacy of this algorithm in preventing and detecting tampering actions. The research procedure includes the identification and analysis of research objects, implementation of Security techniques, and testing the reliability of the developed methods. The implementation is carried out through several techniques such as Bypass Hidden API, Inline Hook, Command Shell, and Syscall to prevent Hooking on Java and native code. The results of the testing show that the developed algorithm can accurately detect tampering and enhance the Security of the application. Testing also demonstrates that the Syscall technique is effective in thwarting attackers' attempts to perform reverse engineering and illegal modifications on Android applications. In conclusion, this study successfully formulates an effective solution to enhance the Security of Android applications through an approach that combines vulnerability analysis, tampering prevention, and the use of Syscall. The developed Signature verification algorithm proves to be efficient and reliable in various conditions, capable of quickly detecting tampering and maintaining application integrity.

Item Type: Thesis (Other)
Contributors:
Contribution
Contributors
NIDN/NIDK
Sponsor
Ramadhan, Rizdqi Akbar
1017049002
Uncontrolled Keywords: Android application Security, Signature verification, tampering, reverse engineering, Hook, Bypass, Syscall.
Subjects: T Technology > T Technology (General)
Divisions: > Teknik Informatika
Depositing User: Yolla Afrina Afrina
Date Deposited: 25 Sep 2025 01:22
Last Modified: 25 Sep 2025 01:22
URI: https://repository.uir.ac.id/id/eprint/30328

Actions (login required)

View Item View Item