How does code obfuscation impact energy usage?

被引:20
作者
Sahin, Cagri [1 ]
Wan, Mian [2 ]
Tornquist, Philip [1 ]
McKenna, Ryan [1 ]
Pearson, Zachary [1 ]
Halfond, William G. J. [2 ]
Clause, James [1 ]
机构
[1] Univ Delaware, Dept Comp Sci, Newark, DE 19716 USA
[2] Univ So Calif, Dept Comp Sci, Los Angeles, CA 90089 USA
基金
美国国家科学基金会;
关键词
mobile applications; energy usage; code obfuscation; empirical study; POWER;
D O I
10.1002/smr.1762
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software piracy is an important concern for application developers. Such concerns are especially relevant in mobile application development, where piracy rates can be greater than 90%. The most common approach used by mobile developers to prevent piracy is code obfuscation. However, the decision to apply such transformations is currently made without regard to the impacts of obfuscations on another area of increasing concern for mobile application developers, energy usage. Because both software piracy and battery life are important concerns, mobile application developers must strike a balance between protecting their applications and preserving the battery lives of their users' devices. To help them make such choices, we conducted an empirical study of the effects of 18 code obfuscations on the amount of energy consumed by executing a total of 21 usage scenarios spread across 11 Android applications on four different mobile phone platforms. The results of the study indicate that, while obfuscations can have a statistically significant impact on energy usage and are more likely to increase energy usage than to decrease energy usage, the magnitudes of such impacts are unlikely to be meaningful to mobile application users. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:565 / 588
页数:24
相关论文
共 82 条
  • [1] Amsel Nadine., 2010, Proceedings, CHI EA, P3337, DOI DOI 10.1145/1753846.1753981
  • [2] [Anonymous], P 16 INT C ARCH SUPP
  • [3] [Anonymous], P 2 INT WORKSH GREEN
  • [4] [Anonymous], EMPIRICAL SOFTWARE E
  • [5] [Anonymous], P LIN S
  • [6] [Anonymous], 2014, P 8 ACM IEEE INT S E
  • [7] [Anonymous], 2014, 11 WORKING C MINING
  • [8] [Anonymous], 2009, HotOS
  • [9] A Practical Guide for Using Statistical Tests to Assess Randomized Algorithms in Software Engineering
    Arcuri, Andrea
    Briand, Lionel
    [J]. 2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2011, : 1 - 10
  • [10] Arunagiri S, STEREO MATCHING PERF, V80, DOI 211Z-80211Z-17