The performance cost of software obfuscation for Android applications

被引:5
|
作者
Zhuang, Yan [1 ]
机构
[1] Friedrich Alexander Univ Erlangen Nurnberg FAU, Dept Comp Sci, D-91054 Erlangen, Germany
关键词
Software complexity metric; Obfuscation; Software quality; Performance measurement; Optimized obfuscation; Android applications; CODE;
D O I
10.1016/j.cose.2017.10.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software security of Android applications is especially susceptible (vulnerable) to malicious reverse engineer than the native code based software, because its Java bytecode is easier to decompile and to reconstruct the original Java source code. Therefore obfuscation is an essential criterion for the protection of Android applications. Meanwhile, the unpredicted performance loss will be caused by the obfuscation, which might seriously influence the user experience of the software. Therefore the obfuscation degree and the performance cost out of it require being optimized. In this paper, we are working on the problem that: to obfuscate an Android application to a target level of "difficulty" degree, while not substantially "slowing it down". We measure "difficulty" by utilizing software complexity metrics and the "slow" in CPU cycles. Within the framework designed for obfuscating Android applications, we implement the "Naive Bayesian Classifier" algorithm for the optimized obfuscation of the software complexity and the performance, and show that it outperforms the algorithm whose predictions rely on mean values. We furthermore investigate the performance penalty imposed by obfuscation process when framework targets different complexity values and metrics. We show that some obfuscation methods are more performance costly than others to achieve the same metric value increase. Our result shows that, for any given software complexity, the required performance benefits can be achieved if the right obfuscation techniques are used. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:57 / 72
页数:16
相关论文
共 50 条
  • [21] A Tutorial on Software Obfuscation
    Banescu, Sebastian
    Pretschner, Alexander
    ADVANCES IN COMPUTERS, VOL 108, 2018, 108 : 283 - 353
  • [22] A Breakthrough in Software Obfuscation
    Barak, Boaz
    COMMUNICATIONS OF THE ACM, 2016, 59 (05) : 112 - 112
  • [23] An anti-obfuscation method for detecting similarity among Android applications in large scale
    Jiao, Sibei
    Ying, Lingyun
    Yang, Yi
    Cheng, Yao
    Su, Purui
    Feng, Dengguo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (07): : 1446 - 1457
  • [24] Performance optimization opportunities in the Android software stack
    Gohil V.
    Ujjainkar N.
    Mekie J.
    Awasthi M.
    BenchCouncil Transactions on Benchmarks, Standards and Evaluations, 2021, 1 (01):
  • [25] Tracking the Software Quality of Android Applications along their Evolution
    Hecht, Geoffrey
    Benomar, Omar
    Rouvoy, Romain
    Moha, Naouel
    Duchien, Laurence
    2015 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2015, : 236 - 247
  • [26] Android App Protection via Interpretation Obfuscation
    Shu, Junliang
    Li, Juanru
    Zhang, Yuanyuan
    Gu, Dawu
    2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC)/2014 IEEE 12th International Conference on Embedded Computing (EmbeddedCom)/2014 IEEE 12th International Conf on Pervasive Intelligence and Computing (PICom), 2014, : 63 - 68
  • [27] Vision: Alleviating Android Developer Burden on Obfuscation
    Hecht, Geoffrey
    Neverov, Cyprien
    Bergel, Alexandre
    2020 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS, MOBILESOFT, 2020, : 137 - 141
  • [28] Baseline for Performance Prediction of Android Applications
    Skretting, Anders
    Gronli, Tor-Morten
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 3304 - 3310
  • [29] Forensic and Software (UN) Obfuscation
    Desnos, Anthony
    Vanderbeken, Eloi
    PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 416 - 430
  • [30] Hopes, Fears, and Software Obfuscation
    Barak, Boaz
    COMMUNICATIONS OF THE ACM, 2016, 59 (03) : 88 - 96