An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs

被引:5
作者
Freiling, Felix C. [1 ]
Protsenko, Mykola [1 ]
Zhuang, Yan [1 ]
机构
[1] Friedrich Alexander Univ Erlangen Nurnberg FAU, Dept Comp Sci, Erlangen, Germany
来源
INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II | 2015年 / 153卷
关键词
Software obfuscation; Mobile security; Android; Software protection; Reverse engineering; Software metrics;
D O I
10.1007/978-3-319-23802-9_24
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We investigate the problem of creating complex software obfuscation for mobile applications. We construct complex software obfuscation from sequentially applying simple software obfuscation methods. We define several desirable and undesirable properties of such transformations, including idempotency and monotonicity. We empirically evaluate a set of 7 obfuscation methods on 240 Android Packages (APKs). We show that many obfuscation methods are idempotent or monotonous.
引用
收藏
页码:315 / 328
页数:14
相关论文
共 18 条
[1]  
[Anonymous], 2014, POUIK GORFI3LD SIMIL
[2]   On the (Im)possibility of Obfuscating Programs [J].
Barak, Boaz ;
Goldreich, Oded ;
Impagliazzo, Russell ;
Rudich, Steven ;
Sahai, Amit ;
Vadhan, Salil ;
Yang, Ke .
JOURNAL OF THE ACM, 2012, 59 (02)
[3]  
Beyer Dirk, 2010, Proceedings of the 18th IEEE International Conference on Program Comprehension (ICPC 2010), P80, DOI 10.1109/ICPC.2010.49
[4]  
Canetti R, 2008, LECT NOTES COMPUT SC, V4965, P489
[5]   A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques [J].
Ceccato, Mariano ;
Di Penta, Massimiliano ;
Falcarin, Paolo ;
Ricca, Filippo ;
Torchiano, Marco ;
Tonella, Paolo .
EMPIRICAL SOFTWARE ENGINEERING, 2014, 19 (04) :1040-1074
[6]  
CHIDAMBER SR, 1991, SIGPLAN NOTICES, V26, P197
[7]   Clustering by compression [J].
Cilibrasi, R ;
Vitányi, PMB .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (04) :1523-1545
[8]   Sandmark - A tool for software protection research [J].
Collberg, Christian ;
Myles, Ginger ;
Huntwork, Andrew .
IEEE Security and Privacy, 2003, 1 (04) :40-49
[9]  
Collberg C, 1997, Tech. rep.
[10]   Semantics-based code obfuscation by abstract interpretation [J].
Dalla Preda, Mila ;
Giacobazzi, Roberto .
JOURNAL OF COMPUTER SECURITY, 2009, 17 (06) :855-908