针对手机游戏模拟器的克隆攻击及防御方法  

Cloning Attacks and Defenses Against Mobile Game Emulators

在线阅读下载全文

作  者:韩哲昊 彭国军[1,2] HAN Zhehao;PENG Guojun(Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,Wuhan University,Wuhan 430072,China;School of Cyber Science and Engineering,Wuhan University,Wuhan 430072,China)

机构地区:[1]武汉大学空天信息安全与可信计算教育部重点实验室,湖北武汉430072 [2]武汉大学国家网络安全学院,湖北武汉430072

出  处:《郑州大学学报(理学版)》2024年第5期20-30,共11页Journal of Zhengzhou University:Natural Science Edition

基  金:国家自然科学基金项目(62172308,61972297,62172144)。

摘  要:近年来随着手游市场的高度发展,市面上诞生了很多手游模拟器,它们给使用者提供更好的体验,但是手游模拟器本身在软件安全层面的建设并不完善。针对现有的主流手游模拟器提出了两种克隆攻击的方法,一种是窃取存储在模拟器本地的用户凭证的方法,另一种是针对手游模拟器的克隆攻击方法。同时,针对所提出的攻击方法,给出基于侧信道方法检测硬件指纹的防御方案,并进行了实验验证。结果表明,即使细微的底层硬件差异也可以在应用层检测到不同的指纹信息,因而此类防御方法可以有效抵挡针对模拟器的克隆攻击。Recent years,with the rapid development of the mobile game market,many mobile game emulators have been released.Compared with traditional mobile devices,the emulators could provide better experience.But the construction of mobile game emulators in terms of software security was not perfect.Two cloning attack methods were proposed for existing mainstream mobile game emulators.One was stealing user′s credentials stored locally in the emulator.The other was cloning attack to mobile game emulators.At the same time,for the proposed attacks,a defense scheme based on the side channel method was given to detect hardware fingerprints and conducts experimental verification.The experimental results showed that even slight differences in the underlying hardware could detect different fingerprint information at the application layer.So this kind of defense method could effectively resist the cloning attack against the emulator.

关 键 词:Android模拟器 克隆攻击 账号安全 侧信道 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象