In the process of work this morning, our audit colleague sent a video of a user opening up to 5 duplicates of our App through software like “multiple duplicates”. At that time, I was the first user to feel what this was like, and then I put how to prevent users from opening multiple duplicates on the agenda.
In Android devices, the application of dopant is very popular at present, and there are many dopant software on the market, such as 360’s dopant master, LBE parallel space, and DroidPlugin. Although it brings a lot of convenience to us, it brings a lot of trouble to the business, such as the non-compliant content generated by the marketing number.
1) Data security risks:
All the application data of the doppleganger are filtered by the doppleganger. The data will inevitably go through the doppleganger. In case the doppleganger is mastered or a third party application is used, the data will have security risks. Similar problems arise with a crude decompilation of APK.
2) Android policy risks:
[Application clone] function is actually implemented by listening to intercept process messages, instead of reflection, similar to hacking means, may be banned by Android such applications. Later Android versions may be restricted from being used.
3) Shortage and resource occupation:
[Application duplicates] Whether the system layer or the application layer is adopted, it will occupy system resources. If there are too many duplicates, the system may become stuck. This can be avoided by limiting the number of doppelganger.
4) Compatibility of tripartite applications
Similar to the risk of Android policy, [Application dopant] may be blocked by third-party applications such as wechat /QQ if it adopts similar hacking methods
Some third-party application call interfaces are not standard, and may not be monitored and replaced by [application dopant], resulting in different compatibility between the dopant application and its own application.
To inform you of the dangers, let’s talk about how to make our application automatically skip when it is open more than once.
Today I have downloaded most of the clone software in the application market, and I know that most of the clone software is implemented by clone backup mode, and then some software virtual machine technology.
Clone way this type of application is very good solve, we only need to put the Context. GetFilesDir print path, look to whether can conform to the normal application, the code is as follows:
However, the above method is not effective for the use of virtual machine technology, but we can actively throw an exception to detect whether the crash log contains the filter word we set to determine
Then we can set up the filter word, at present I set the filter word xposed, Morgoo (360 doppelgat), Droidplugin, in the late process we continue to explore constantly to fill these filter words.
In addition to the application doppe, many users also like to use the simulator. How to judge whether it is a simulator or not, we can tell from the CPU architecture, Bluetooth, dialing, temperature sensing, remote sensing and other functions that the simulator does not have.
In the process of business development, we should pay attention to the user’s operation behaviors that may be beyond the scope of our permission. At this time, we should correct the user behavior in time.