Well, until we figure out how to test against the signature, I used
the method for finding the crc here:
http://www.javafaq.nu/java-example-code-230.html

using getApplicationContext().getPackageCodePath() as the file name.

Fortunately,  my app is 100% dependent on server data.  So i just post
the crc with every call to the server, and do this before anything
else:

$valid_crcs = array(43533464345,9905847384);
if( !in_array($_POST[crc],$valid_crcs) ){
 die();
}

I'm only just testing it, and I expect it to become a hassle because I
maintain a market and off-market version, and a beta for each, so four
current version, plus supporting old versions.  The crc array is going
to get long. Add in the Amazon market, and Verizon market... ugh...
Still, it seems like it might be effective.

Of course, if the hacker is good enough, they can check the crc before
they modify it, then hard code that crc into the calls to the web
server.  So maybe it won't be effective at all...

On Oct 1, 4:52 pm, DanH <danhi...@ieee.org> wrote:
> Yeah, that's essentially what I was saying.
>
> On Oct 1, 4:45 pm, Kostya Vasilyev <kmans...@gmail.com> wrote:
>
>
>
>
>
>
>
> > Regarding signature checking - I think having LVL check the signature
> > against the correct one (known to Market) would be very useful in thwarting
> > attacks on LVL based on modifying the application code.
>
> > Pirates (hackers) don't have access to the developer's private key, so after
> > modifying the application, they have to sign it using some other key. This
> > could be detected by the Market server when performing LVL checks.
>
> > --
> > Kostya Vasilyev --http://kmansoft.wordpress.com
>
> > 02.10.2010 1:12 пользователь "DanH" <danhi...@ieee.org> написал:
>
> > In theory there's no need to checksum your apk file, unless you
> > suspect it's being dynamically modified.  The apk was signed with your
> > private key, and can't be modified by anyone else without invalidating
> > the signature.
>
> > What you really want to be sure of is that the application is signed
> > with your certificate.  (Of course, I've not yet found a way to access
> > that info.)
>
> > On Sep 28, 1:30 am, Asker <mallorc...@gmail.com> wrote:
>
> > > Hi,
>
> > > Following the examples given by Johns Trevor in order to secure
> > > Android LVL Applications...

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to