Taranjeet Kaur Chawla et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April- 2014, pg. 1204-1208 © 2014, IJCSMC All Rights Reserved 1204 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320088X IJCSMC, Vol. 3, Issue. 4, April 2014, pg.1204 1208 RESEARCH ARTICLE Transfiguring of an Android App Using Reverse Engineering Taranjeet Kaur Chawla, Aditi Kajala M.Tech(CSE), Mody University of Science and Technology, Lakshmangarh, India taran.chawla17@gmail.com, aditikajala.fet@modyuniversity.ac.in AbstractToday in this webbed world, smartphones have conquered a major part i n human’s life. An android application is an assemblage of Java which is edited from the source code, to .class file, further to .dex files to execute on the Dalvik virtual machine. Here, in this paper we have implemented the reverse engineering principle on an android app which is responsible for leaking the personal information from your smartphone such as IMEI, IMSI etc. Our research includes and emphasizes the misuse of personal/phone identifiers as well as the physical location. This paper seeks better to analyse over more than 1000 android applications which are free for the user. We have carried out the analysis i.e. static as well as dynamic. KeywordsAndroid; IMEI; IMSI; Reverse engineering, Dalvik I. INTRODUCTION Android has refashioned the mobile world. It is a comprehensive as well as an open source platform. Along with the android becoming popular software, there also come a number of loopholes. The day-by-day increasing numbers of free applications, which are provided by the markets, such as Apple‟s App Store and Google Android Market, with just one click have led to a hindrance in security. The security model of android is unique. The open nature of the platform always welcomes the changes and countermeasures. These changes can even help or violate with the security, therefore, it‟s more necessary to focus on protecting the device from hackers. The loopholes and the bugs of the current application act as a favourable condition for the hackers to exploit. Phishing, usage of local data, unsafe http connections etc. are the most common today. [1] It has been surveyed that around 50 applications in Google‟s Play Market leaked sensitive information as it migrated from handset to handset specifically on the Ice Cream Sandwich version of android and also on the other web services. Attributes of successful online communities are recognized and help in attaining and designing a security platform for the android applications. A good number of exploits were found as the handsets were connected to a local network. A number of available android apps have a necessity to pass the messages over the web and therefore are considered for securing the sensitive data during the transition. Further it has been studied that these apps make use of SSL/TLS protocols. It has been estimated that 1,074 (8.0%) of the apps studied and analysed have the SSL/TLS code which is prone to MITM attacks.[2] But still, the problems were tackled and were able to win over the SSL layer and the transport layer which were implemented. Particularly, the specific applications were not discoverable but still they were downloaded for around 39.5 million to 185 million times.