Obfuscated Android Application Development

被引:1
|
作者
Graux, Pierre [1 ]
Lalande, Jean-Francois [1 ]
Tong, Valerie Viet Triem [1 ]
机构
[1] Univ Rennes, CNRS, IRISA, INRIA,Cent Supelec, Rennes, France
关键词
obfuscation; mobile; application;
D O I
10.1145/3360664.3361144
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Obfuscation techniques help developers to hide their code when distributing an Android application. The used techniques are linked to the features provided by the programming language but also with the way the application is executed. Using obfuscation is now a common practice and specialized companies sell tools or services for automatizing the manipulation of the source code. In this paper, we present how to develop obfuscated applications and how obfuscation technique usage is evolving in the wild. First, using advanced obfuscation techniques requires some advanced knowledge about the development of Android applications. We describe how to build such applications for helping researchers to generate samples of obfuscated applications for their own research. Second, the use of obfuscation techniques is evolving for both regular applications or malicious ones. We aim at measuring the development of these usages by studying application and malware samples and the artifacts that indicate the use of obfuscation techniques.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Libra: Library Identification in Obfuscated Android Apps
    Tomassi, David A.
    Nwodo, Kenechukwu
    Elsabagh, Mohamed
    [J]. INFORMATION SECURITY, ISC 2023, 2023, 14411 : 205 - 225
  • [2] Unified Detection of Obfuscated and Native Android Malware
    Ouk, Pagnchakneat C.
    Pak, Wooguil
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 3099 - 3116
  • [3] An Overview of Techniques for Obfuscated Android Malware Detection
    Siddiqui S.
    Khan T.A.
    [J]. SN Computer Science, 5 (4)
  • [4] Evaluation of Survivability of the Automatically Obfuscated Android Malware
    Patel, Himanshu
    Patel, Deep
    Ahluwalia, Jaspreet
    Kapoor, Vaishali
    Narasimhan, Karthik
    Singh, Harmanpreet
    Kaur, Harmanjot
    Reddy, Gadi Harshitha
    Peruboina, Sai Sushma
    Butakov, Sergey
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (10):
  • [5] DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications
    Cho, Haehyun
    Yi, Jeong Hyun
    Ahn, Gail-Joon
    [J]. IEEE ACCESS, 2018, 6 : 71229 - 71240
  • [6] The rise of obfuscated Android malware and impacts on detection methods
    Elsersy, Wael F.
    Feizollah, Ali
    Anuar, Nor Badrul
    [J]. PEERJ COMPUTER SCIENCE, 2022, 8
  • [7] DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware
    Suarez-Tangil, Guillermo
    Dash, Santanu Kumar
    Ahmadi, Mansour
    Kinder, Johannes
    Giacinto, Giorgio
    Cavallaro, Lorenzo
    [J]. PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 309 - 320
  • [8] The rise of obfuscated Android malware and impacts on detection methods
    Elsersy, Wael F.
    Feizollah, Ali
    Anuar, Nor Badrul
    [J]. PeerJ Computer Science, 2022, 8
  • [9] Android application development tools
    Yagi, Ryoichi
    [J]. Kyokai Joho Imeji Zasshi/Journal of the Institute of Image Information and Television Engineers, 2010, 64 (04): : 524 - 529
  • [10] Android Application Development and Testability
    Knych, Thomas W.
    Baliga, Ashwin
    [J]. PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT 2014), 2014, : 37 - 40