The performance cost of software obfuscation for Android applications

被引:5
|
作者
Zhuang, Yan [1 ]
机构
[1] Friedrich Alexander Univ Erlangen Nurnberg FAU, Dept Comp Sci, D-91054 Erlangen, Germany
关键词
Software complexity metric; Obfuscation; Software quality; Performance measurement; Optimized obfuscation; Android applications; CODE;
D O I
10.1016/j.cose.2017.10.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software security of Android applications is especially susceptible (vulnerable) to malicious reverse engineer than the native code based software, because its Java bytecode is easier to decompile and to reconstruct the original Java source code. Therefore obfuscation is an essential criterion for the protection of Android applications. Meanwhile, the unpredicted performance loss will be caused by the obfuscation, which might seriously influence the user experience of the software. Therefore the obfuscation degree and the performance cost out of it require being optimized. In this paper, we are working on the problem that: to obfuscate an Android application to a target level of "difficulty" degree, while not substantially "slowing it down". We measure "difficulty" by utilizing software complexity metrics and the "slow" in CPU cycles. Within the framework designed for obfuscating Android applications, we implement the "Naive Bayesian Classifier" algorithm for the optimized obfuscation of the software complexity and the performance, and show that it outperforms the algorithm whose predictions rely on mean values. We furthermore investigate the performance penalty imposed by obfuscation process when framework targets different complexity values and metrics. We show that some obfuscation methods are more performance costly than others to achieve the same metric value increase. Our result shows that, for any given software complexity, the required performance benefits can be achieved if the right obfuscation techniques are used. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:57 / 72
页数:16
相关论文
共 50 条
  • [31] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Hui Xu
    Yangfan Zhou
    Jiang Ming
    Michael Lyu
    Cybersecurity, 3
  • [32] Methods and Software for the Program Obfuscation
    Shevtsova, O. O.
    Buintsev, D. N.
    SIBCON-2009: INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS, 2009, : 113 - 115
  • [33] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Xu, Hui
    Zhou, Yangfan
    Ming, Jiang
    Lyu, Michael
    CYBERSECURITY, 2020, 3 (01)
  • [34] Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations
    Zhang, Xiaolu
    Breitinger, Frank
    Luechinger, Engelbert
    O'Shaughnessy, Stephen
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 39
  • [35] Software cost planning and performance
    Clements, JP
    Gido, J
    DECISION SCIENCES INSTITUTE 1998 PROCEEDINGS, VOLS 1-3, 1998, : 865 - 867
  • [36] BLADE: Robust malware detection against obfuscation in android
    Sihag, Vikas
    Vardhan, Manu
    Singh, Pradeep
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 38
  • [37] A Survey of Obfuscation and Deobfuscation Techniques in Android Code Protection
    Guo, Runsheng
    Liu, Qichao
    Zhang, Man
    Hu, Ning
    Lu, Hui
    Proceedings - 2022 7th IEEE International Conference on Data Science in Cyberspace, DSC 2022, 2022, : 40 - 47
  • [38] BLADE: Robust malware detection against obfuscation in android
    Sihag, Vikas
    Vardhan, Manu
    Singh, Pradeep
    Forensic Science International: Digital Investigation, 2021, 38
  • [39] Obfuscation-Resilient Code Recognition in Android Apps
    Feichtner, Johannes
    Rabensteiner, Christof
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [40] Unmasking Android Obfuscation Tools Using Spatial Analysis
    Kaur, Ratinder
    Ning, Ye
    Gonzalez, Hugo
    Stakhanova, Natalia
    2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 237 - 246