Reprint: android on a key new machine, change machine change machines overview of the advantages and disadvantages xposed

Currently, android system is a key to the new machine, change machine module (application variables, 008, deep etc.) essentially based xposed frame. Xposed installed frame, and then install the change machine APP. This paper summarizes the principle Xposed framework to achieve drawback of this method to change the machine:

Xposed framework to achieve the principle of Hook's introduction: Zygote process is the core of Android, each running a app, Zygote will fork a virtual machine instance to run the app. Zygote boot configuration in /init.rc script, started by the time the system is turned on this process, the corresponding executable file is / system / bin / app_process, the complete library file is loaded and a number of function calls work. When the system is installed in the Xposed framework, app_process will be extended, that is to say, Xposed framework will take to achieve coverage app_process app_process own native Android swap file provided when the system starts, it will replace the over-loaded by the Xposed Framework process file. Similar programming section, when calling java android layer interfaces, a hook Xposed implemented in the interface layer, such as beforeHookedMethod and afterHookedMethod (Method implement a custom hook before calling the method and the JAVA android)

Description see from the above principle:

 

Xposed need to replace / system / bin / app_process, requiring handsets root privileges;
Xposed implemented in java hook layer, only the parameters obtained by modifying device JAVA layer.
Phone needs to install XposedInstaller.apk; 
Xposed section is programmed for every JAVA calls, Xposed hook function will be executed, it has a greater impact on system performance.
For brush flow brush or a variety of advertising support number, the phone is root, obtain the device parameters are inconsistent seriously affected the conversion rate, and even recently often second title.

Phone root of detection:

1) Although xposed have RootCloak (Root hidden), saying that allow for specific APP, the device has the ROOT of this feature to hide, so as to achieve the purpose of continuing to use these APP in the case of ROOT. Xposed this is only wishful thinking. For professional third-party inspection tools or large game companies generally have a dedicated anti-cheating researchers, for this type of Root will be able to hide easily detected.

 For RootCloak function, as well as other hidden features of root principles are similar: first need to select the hidden root of the APP, followed by the need to enumerate all the possible places detection system root function of adding hook function to deceive app, such as when the detected root of execution APP when the shell command system / bin / su, back to this command is present, in order to deceive the system is not su command app. For the detection of APP, many detection points, and detection of APP at any time before updating. The hidden root function must be set at each point detection hook, but feel free to follow updated app changes, as long as slip a point to hide failed. root is a shield to hide, only a passive defense; detection app is spear. Detection of changing the stabbing spear always different locations, there will always be a shield defense will fail. 

 To be able to hide the root function, unless this is no root system, it would be difficult defense.

2) xposed hook is a virtual machine, xposed only modify the device parameters obtained through JAVA layer, java layer to obtain device information only android standard acquisition mode, there are a variety of methods to obtain device information, professional inspection tools usually by jni call device checks while doing native layer, this layer is powerless Xposed operation. Or acquiring property through the device, xposed is no way to modify. Equipment to detect different way to get the consistency of information, whereby it can determine whether to modify the device. So incomplete modifications might as well do not change.

 Large companies and professional testing tools company, a group of people dedicated to research every day how anti-cheating, anti-camouflage, you know they are more proficient. Is there a way to change the machines and the perfect disguise it, theoretically, because the device in their hands.
----------------
see the text of this blog you are interested in other machine technology can change the look of this: phone unlimited become a new device

Guess you like

Origin www.cnblogs.com/xkrj5/p/12516754.html