An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs

被引:5
|
作者
Freiling, Felix C. [1 ]
Protsenko, Mykola [1 ]
Zhuang, Yan [1 ]
机构
[1] Friedrich Alexander Univ Erlangen Nurnberg FAU, Dept Comp Sci, Erlangen, Germany
关键词
Software obfuscation; Mobile security; Android; Software protection; Reverse engineering; Software metrics;
D O I
10.1007/978-3-319-23802-9_24
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We investigate the problem of creating complex software obfuscation for mobile applications. We construct complex software obfuscation from sequentially applying simple software obfuscation methods. We define several desirable and undesirable properties of such transformations, including idempotency and monotonicity. We empirically evaluate a set of 7 obfuscation methods on 240 Android Packages (APKs). We show that many obfuscation methods are idempotent or monotonous.
引用
收藏
页码:315 / 328
页数:14
相关论文
共 50 条
  • [41] An empirical study of ensemble techniques for software fault prediction
    Rathore, Santosh S.
    Kumar, Sandeep
    APPLIED INTELLIGENCE, 2021, 51 (06) : 3615 - 3644
  • [42] Security verification techniques applied to PatchLink COTS software
    Gilliam, David P.
    Powell, John D.
    Bishop, Matt
    Andrew, Chris
    Jog, Sameer
    15TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2006, : 319 - +
  • [43] An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
    Fan, Ming
    Yu, Le
    Chen, Sen
    Zhou, Hao
    Luo, Xiapu
    Li, Shuyue
    Liu, Yang
    Liu, Jun
    Liu, Ting
    2020 IEEE 31ST INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2020), 2020, : 253 - 264
  • [44] An empirical evaluation of defect detection techniques
    Roper, M
    Wood, M
    Miller, J
    INFORMATION AND SOFTWARE TECHNOLOGY, 1997, 39 (11) : 763 - 775
  • [45] Empirical Evaluation of Image Reconstruction Techniques
    Priya, B. Shunmuga
    Suruliandi, A.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [46] AN EMPIRICAL EVALUATION OF REPETITIVE UNDERSAMPLING TECHNIQUES
    Van Hulse, Jason
    Khoshgoftaar, Taghi M.
    Napolitano, Amri
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2010, 20 (02) : 173 - 195
  • [47] COMPUTER TECHNIQUES APPLIED TO FORMATION EVALUATION
    MERKEL, RH
    MACCARY, LM
    CHICKO, RS
    GEOPHYSICS, 1976, 41 (02) : 365 - 365
  • [48] The Acceptance of Search-Based Software Engineering Techniques: An Empirical Evaluation Using the Technology Acceptance Model
    Mezhuyev, Vitaliy
    Al-Emran, Mostafa
    Ismail, Mohd Arfian
    Benedicenti, Luigi
    Chandran, Durkahpuvanesvari A. P.
    IEEE ACCESS, 2019, 7 : 101073 - 101085
  • [49] An evaluation scheme of software testing techniques
    Chu, HD
    RELIABILITY, QUALITY AND SAFETY OF SOFTWARE-INTENSIVE SYSTEMS, 1997, : 259 - 262
  • [50] An Evaluation of Agile Software Methodology Techniques
    Sutharshan, A.
    Maj, S. P.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (12): : 68 - 71