The performance cost of software obfuscation for Android applications

被引:5
|
作者
Zhuang, Yan [1 ]
机构
[1] Friedrich Alexander Univ Erlangen Nurnberg FAU, Dept Comp Sci, D-91054 Erlangen, Germany
关键词
Software complexity metric; Obfuscation; Software quality; Performance measurement; Optimized obfuscation; Android applications; CODE;
D O I
10.1016/j.cose.2017.10.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software security of Android applications is especially susceptible (vulnerable) to malicious reverse engineer than the native code based software, because its Java bytecode is easier to decompile and to reconstruct the original Java source code. Therefore obfuscation is an essential criterion for the protection of Android applications. Meanwhile, the unpredicted performance loss will be caused by the obfuscation, which might seriously influence the user experience of the software. Therefore the obfuscation degree and the performance cost out of it require being optimized. In this paper, we are working on the problem that: to obfuscate an Android application to a target level of "difficulty" degree, while not substantially "slowing it down". We measure "difficulty" by utilizing software complexity metrics and the "slow" in CPU cycles. Within the framework designed for obfuscating Android applications, we implement the "Naive Bayesian Classifier" algorithm for the optimized obfuscation of the software complexity and the performance, and show that it outperforms the algorithm whose predictions rely on mean values. We furthermore investigate the performance penalty imposed by obfuscation process when framework targets different complexity values and metrics. We show that some obfuscation methods are more performance costly than others to achieve the same metric value increase. Our result shows that, for any given software complexity, the required performance benefits can be achieved if the right obfuscation techniques are used. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:57 / 72
页数:16
相关论文
共 50 条
  • [41] Effectiveness of Android Obfuscation on Evading Anti-malware
    Chua, Melissa
    Balachandran, Vivek
    PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 143 - 145
  • [42] ORLIS: Obfuscation-Resilient Library Detection for Android
    Wang, Yan
    Wu, Haowei
    Zhang, Hailong
    Rountev, Atanas
    2018 IEEE/ACM 5TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT), 2018, : 13 - 23
  • [43] A search cost model of obfuscation
    Ellison, Glenn
    Wolitzky, Alexander
    RAND JOURNAL OF ECONOMICS, 2012, 43 (03): : 417 - 441
  • [44] Tackling runtime-based obfuscation in Android with TIRO
    Wong, Michelle Y.
    Lie, David
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1247 - 1262
  • [45] Performance of Automation Testing Tools for Android Applications
    Sinaga, Arnaldo Marulitua
    Wibowo, Adi P.
    Silalahi, Ariestoni
    Yolanda, Nita
    PROCEEDINGS OF 2018 THE 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND ELECTRICAL ENGINEERING (ICITEE), 2018, : 534 - 539
  • [46] Performance Evaluation of Android Applications: a Case Study
    Fernandes, Thiago Soares
    Cota, Erika
    Moreira, Alvaro Freitas
    PROCEEDINGS OF IV BRAZILIAN SYMPOSIUM ON COMPUTING SYSTEMS ENGINEERING SBESC 2014, 2014, : 79 - 84
  • [47] On the concept of software obfuscation in computer security
    Kuzurin, Nikolay
    Shokurov, Alexander
    Varnovsky, Nikolay
    Zakharov, Vladimir
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 281 - +
  • [48] Novel obfuscation algorithms for software security
    Ertaul, L
    Venkatesh, S
    SERP '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2005, : 209 - 215
  • [49] Assessing the Security Properties of Software Obfuscation
    Xu, Hui
    Lyu, Michael R.
    IEEE SECURITY & PRIVACY, 2016, 14 (05) : 80 - 83
  • [50] Software Protection with Increased Complexity and Obfuscation
    Tsui, Frank
    Duggins, Sheryl
    Karam, Orlando
    PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE, 2012,