An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs

被引:5
|
作者
Freiling, Felix C. [1 ]
Protsenko, Mykola [1 ]
Zhuang, Yan [1 ]
机构
[1] Friedrich Alexander Univ Erlangen Nurnberg FAU, Dept Comp Sci, Erlangen, Germany
关键词
Software obfuscation; Mobile security; Android; Software protection; Reverse engineering; Software metrics;
D O I
10.1007/978-3-319-23802-9_24
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We investigate the problem of creating complex software obfuscation for mobile applications. We construct complex software obfuscation from sequentially applying simple software obfuscation methods. We define several desirable and undesirable properties of such transformations, including idempotency and monotonicity. We empirically evaluate a set of 7 obfuscation methods on 240 Android Packages (APKs). We show that many obfuscation methods are idempotent or monotonous.
引用
收藏
页码:315 / 328
页数:14
相关论文
共 50 条
  • [1] Detection of Obfuscation Techniques in Android Applications
    Bacci, Alessandro
    Bartoli, Alberto
    Martinelli, Fabio
    Medvet, Eric
    Mercaldo, Francesco
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [2] Evaluation of Android Anti Malware Techniques against Dalvik Bytecode Obfuscation
    Faruki, Parvez
    Bharmal, Ammar
    Laxmi, Vijay
    Gaur, M. S.
    Conti, Mauro
    Rajarajan, Muttukrishnan
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 414 - 421
  • [3] On the evaluation of android malware detectors against code-obfuscation techniques
    Nawaz, Umair
    Aleem, Muhammad
    Lin, Jerry Chun-Wei
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [4] The performance cost of software obfuscation for Android applications
    Zhuang, Yan
    COMPUTERS & SECURITY, 2018, 73 : 57 - 72
  • [5] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Hui Xu
    Yangfan Zhou
    Jiang Ming
    Michael Lyu
    Cybersecurity, 3
  • [6] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Xu, Hui
    Zhou, Yangfan
    Ming, Jiang
    Lyu, Michael
    CYBERSECURITY, 2020, 3 (01)
  • [7] A Survey of Obfuscation and Deobfuscation Techniques in Android Code Protection
    Guo, Runsheng
    Liu, Qichao
    Zhang, Man
    Hu, Ning
    Lu, Hui
    Proceedings - 2022 7th IEEE International Conference on Data Science in Cyberspace, DSC 2022, 2022, : 40 - 47
  • [8] Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations
    Zhang, Xiaolu
    Breitinger, Frank
    Luechinger, Engelbert
    O'Shaughnessy, Stephen
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 39
  • [9] An empirical framework for defect prediction using machine learning techniques with Android software
    Malhotra, Ruchika
    APPLIED SOFT COMPUTING, 2016, 49 : 1034 - 1050
  • [10] Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM
    Matsuoka Y.
    Fujieda N.
    Ichikawa S.
    IEEJ Transactions on Industry Applications, 2019, 139 (02): : 111 - 118