The performance cost of software obfuscation for Android applications

被引:5
|
作者
Zhuang, Yan [1 ]
机构
[1] Friedrich Alexander Univ Erlangen Nurnberg FAU, Dept Comp Sci, D-91054 Erlangen, Germany
关键词
Software complexity metric; Obfuscation; Software quality; Performance measurement; Optimized obfuscation; Android applications; CODE;
D O I
10.1016/j.cose.2017.10.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software security of Android applications is especially susceptible (vulnerable) to malicious reverse engineer than the native code based software, because its Java bytecode is easier to decompile and to reconstruct the original Java source code. Therefore obfuscation is an essential criterion for the protection of Android applications. Meanwhile, the unpredicted performance loss will be caused by the obfuscation, which might seriously influence the user experience of the software. Therefore the obfuscation degree and the performance cost out of it require being optimized. In this paper, we are working on the problem that: to obfuscate an Android application to a target level of "difficulty" degree, while not substantially "slowing it down". We measure "difficulty" by utilizing software complexity metrics and the "slow" in CPU cycles. Within the framework designed for obfuscating Android applications, we implement the "Naive Bayesian Classifier" algorithm for the optimized obfuscation of the software complexity and the performance, and show that it outperforms the algorithm whose predictions rely on mean values. We furthermore investigate the performance penalty imposed by obfuscation process when framework targets different complexity values and metrics. We show that some obfuscation methods are more performance costly than others to achieve the same metric value increase. Our result shows that, for any given software complexity, the required performance benefits can be achieved if the right obfuscation techniques are used. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:57 / 72
页数:16
相关论文
共 50 条
  • [1] Control flow obfuscation for Android applications
    Balachandran, Vivek
    Sufatrio
    Tan, Darell J. J.
    Thing, Vrizlynn L. L.
    COMPUTERS & SECURITY, 2016, 61 : 72 - 93
  • [2] Detection of Obfuscation Techniques in Android Applications
    Bacci, Alessandro
    Bartoli, Alberto
    Martinelli, Fabio
    Medvet, Eric
    Mercaldo, Francesco
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [3] Progressive Control Flow Obfuscation for Android Applications
    Zhang, Li
    Meng, Huasong
    Thing, Vrizlynn L. L.
    PROCEEDINGS OF TENCON 2018 - 2018 IEEE REGION 10 CONFERENCE, 2018, : 1075 - 1079
  • [4] Memory Obfuscation by Stack Randomization for Android Applications
    Zolotarev, Vyacheslav
    Doronina, Daria
    2017 11TH IEEE INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT 2017), 2017, : 247 - 251
  • [5] Applications of homomorphic functions to software obfuscation
    Zhu, William
    Thomborson, Clark
    Wang, Fei-Yue
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 152 - 153
  • [6] An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs
    Freiling, Felix C.
    Protsenko, Mykola
    Zhuang, Yan
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 315 - 328
  • [7] Detecting Similar Components between Android Applications with Obfuscation
    Yuan, Li
    PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2016, : 186 - 190
  • [8] Obfuscation detection in Android applications using deep learning
    Conti, Mauro
    Vinod, P.
    Vitella, Alessio
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [9] Ordol: Obfuscation-Resilient Detection of Libraries in Android Applications
    Titze, Dennis
    Lux, Michael
    Schuette, Julian
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 618 - 625
  • [10] Control Flow Obfuscation Based Protection Method for Android Applications
    Peng, Yong
    Su, Guanyu
    Tian, Bin
    Sun, Maohua
    Li, Qi
    CHINA COMMUNICATIONS, 2017, 14 (11) : 247 - 259