Encryption and Real Time Decryption for protecting Machine Learning models in Android Applications

by   Aryan Verma, et al.

With the Increasing use of Machine Learning in Android applications, more research and efforts are being put into developing better-performing machine learning algorithms with a vast amount of data. Along with machine learning for mobile phones, the threat of extraction of trained machine learning models from application packages (APK) through reverse engineering exists. Currently, there are ways to protect models in mobile applications such as name obfuscation, cloud deployment, last layer isolation. Still, they offer less security, and their implementation requires more effort. This paper gives an algorithm to protect trained machine learning models inside android applications with high security and low efforts to implement it. The algorithm ensures security by encrypting the model and real-time decrypting it with 256-bit Advanced Encryption Standard (AES) inside the running application. It works efficiently with big model files without interrupting the User interface (UI) Thread. As compared to other methods, it is fast, more secure, and involves fewer efforts. This algorithm provides the developers and researchers a way to secure their actions and making the results available to all without any concern.



There are no comments yet.


page 4


Open Mobile API: Accessing the UICC on Android Devices

This report gives an overview of secure element integration into Android...

Security Analysis of Mobile Banking Application in Qatar

This paper discusses the security posture of Android m-banking applicati...

Feasibility of Supervised Machine Learning for Cloud Security

Cloud computing is gaining significant attention, however, security is t...

R-PackDroid: Practical On-Device Detection of Android Ransomware

Ransomware constitutes a major threat for the Android operating system. ...

Exploiting ML algorithms for Efficient Detection and Prevention of JavaScript-XSS Attacks in Android Based Hybrid Applications

The development and analysis of mobile applications in term of security ...

Secure Machine Learning in the Cloud Using One Way Scrambling by Deconvolution

Cloud-based machine learning services (CMLS) enable organizations to tak...

PINPOINT: Efficient and Effective Resource Isolation for Mobile Security and Privacy

Virtualization is frequently used to isolate untrusted processes and con...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.