Vision: Alleviating Android Developer Burden on Obfuscation

被引:1
|
作者
Hecht, Geoffrey [1 ]
Neverov, Cyprien [1 ]
Bergel, Alexandre [1 ]
机构
[1] Univ Chile, ISCLab, Dept Comp Sci, Santiago, Chile
关键词
CONTROL FLOW OBFUSCATION;
D O I
10.1145/3387905.3388611
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile applications (apps) have gained an increasing importance in the field of software engineering as they are becoming one of the most widely used type of software. In the Android ecosystem, obfuscation tools are available to optimize, reduce the size and protect the intellectual properties of apps. However, despite the clear advantages provided by obfuscation most apps do not use it, often because of the difficulties induced by the usage of obfuscation which requires writing rules to keep a usable app. In this paper, we identify the concrete challenges encountered by app developers who wish to use obfuscation in their apps. In addition, we propose an approach using crowdsourcing to automatically generate rules, when static analysis is not sufficient. With the knowledge gained from hundreds of projects, we hope to lighten the burden on developers when writing rules.
引用
收藏
页码:137 / 141
页数:5
相关论文
共 50 条
  • [1] ANDRODET: An adaptive Android obfuscation detector
    Mirzaei, O.
    de Fuentes, J. M.
    Tapiador, J.
    Gonzalez-Manzano, L.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 90 : 240 - 261
  • [2] Control flow obfuscation for Android applications
    Balachandran, Vivek
    Sufatrio
    Tan, Darell J. J.
    Thing, Vrizlynn L. L.
    COMPUTERS & SECURITY, 2016, 61 : 72 - 93
  • [3] Detection of Obfuscation Techniques in Android Applications
    Bacci, Alessandro
    Bartoli, Alberto
    Martinelli, Fabio
    Medvet, Eric
    Mercaldo, Francesco
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [4] Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime
    Wang, Zhichao
    Shan, Yiwei
    Yang, Zhi
    Wang, Ruoyi
    Song, Shuang
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1756 - 1763
  • [5] AEON: Android Encryption based Obfuscation
    Geethanjali, D.
    Ying, Tan Li
    Melissa, Chua Wan Jun
    Balachandran, Vivek
    PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 146 - 148
  • [6] Abusing Android Runtime for Application Obfuscation
    Graux, Pierre
    Lalande, Jean-Francois
    Wilke, Pierre
    Tong, Valerie Viet Triem
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 616 - 624
  • [7] Progressive Control Flow Obfuscation for Android Applications
    Zhang, Li
    Meng, Huasong
    Thing, Vrizlynn L. L.
    PROCEEDINGS OF TENCON 2018 - 2018 IEEE REGION 10 CONFERENCE, 2018, : 1075 - 1079
  • [8] Memory Obfuscation by Stack Randomization for Android Applications
    Zolotarev, Vyacheslav
    Doronina, Daria
    2017 11TH IEEE INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT 2017), 2017, : 247 - 251
  • [9] The performance cost of software obfuscation for Android applications
    Zhuang, Yan
    COMPUTERS & SECURITY, 2018, 73 : 57 - 72
  • [10] Android App Protection via Interpretation Obfuscation
    Shu, Junliang
    Li, Juanru
    Zhang, Yuanyuan
    Gu, Dawu
    2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC)/2014 IEEE 12th International Conference on Embedded Computing (EmbeddedCom)/2014 IEEE 12th International Conf on Pervasive Intelligence and Computing (PICom), 2014, : 63 - 68