Open commjoen opened 4 years ago
On devices running Android 10 (API level 29) and higher you can tell the platform to run embedded DEX code directly from your app’s APK file. This option can help prevent an attack if an attacker ever managed to tamper with the locally compiled code on the device.
How's the scenario? What are we protecting exactly?
In any case (before and after this change), modifying the embedded DEX files will break the signature, so the new change does not make any difference for repackaged apps. Then we're talking about original apps and are already installed and running on a non-rooted device.
The attacker tampers with the locally compiled code...
Just trying to brainstorm a little bit to get concrete here.
You can now run dEX code directly as anti-tampering control (see https://developer.android.com/about/versions/10/features#embedded-dex). this should be part of the anti-reverse engineering techniques