How does code obfuscation impact energy usage?

被引:20
作者
Sahin, Cagri [1 ]
Wan, Mian [2 ]
Tornquist, Philip [1 ]
McKenna, Ryan [1 ]
Pearson, Zachary [1 ]
Halfond, William G. J. [2 ]
Clause, James [1 ]
机构
[1] Univ Delaware, Dept Comp Sci, Newark, DE 19716 USA
[2] Univ So Calif, Dept Comp Sci, Los Angeles, CA 90089 USA
基金
美国国家科学基金会;
关键词
mobile applications; energy usage; code obfuscation; empirical study; POWER;
D O I
10.1002/smr.1762
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software piracy is an important concern for application developers. Such concerns are especially relevant in mobile application development, where piracy rates can be greater than 90%. The most common approach used by mobile developers to prevent piracy is code obfuscation. However, the decision to apply such transformations is currently made without regard to the impacts of obfuscations on another area of increasing concern for mobile application developers, energy usage. Because both software piracy and battery life are important concerns, mobile application developers must strike a balance between protecting their applications and preserving the battery lives of their users' devices. To help them make such choices, we conducted an empirical study of the effects of 18 code obfuscations on the amount of energy consumed by executing a total of 21 usage scenarios spread across 11 Android applications on four different mobile phone platforms. The results of the study indicate that, while obfuscations can have a statistically significant impact on energy usage and are more likely to increase energy usage than to decrease energy usage, the magnitudes of such impacts are unlikely to be meaningful to mobile application users. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:565 / 588
页数:24
相关论文
共 82 条
  • [11] Green: A Framework for Supporting Energy-Conscious Programming using Controlled Approximation
    Baek, Woongki
    Chilimbi, Trishul M.
    [J]. PLDI '10: PROCEEDINGS OF THE 2010 ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION, 2010, : 198 - 209
  • [12] Bartenstein TW, 2013, PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), P532, DOI 10.1109/ICSE.2013.6606599
  • [13] CONTROLLING THE FALSE DISCOVERY RATE - A PRACTICAL AND POWERFUL APPROACH TO MULTIPLE TESTING
    BENJAMINI, Y
    HOCHBERG, Y
    [J]. JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-STATISTICAL METHODOLOGY, 1995, 57 (01) : 289 - 300
  • [14] Brooks D, 2000, PROCEEDING OF THE 27TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, P83, DOI [10.1145/342001.339657, 10.1109/ISCA.2000.854380]
  • [15] Bunse C, 2009, ICSOFT 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 2, P199
  • [16] Bunse Christian., 2013, EASED@ BUIS, P7
  • [17] Cao T, 2012, CONF PROC INT SYMP C, P225
  • [18] The Effectiveness of Source Code Obfuscation: an Experimental Assessment
    Ceccato, Mariano
    Di Penta, Massimiliano
    Nagra, Jasvir
    Falcarin, Paolo
    Ricca, Filippo
    Torchiano, Marco
    Tonella, Paolo
    [J]. ICPC: 2009 IEEE 17TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION, 2009, : 178 - +
  • [19] Ching-Long Su, 1994, Digest of Papers. Spring COMPCON 94 (Cat. No.94CH3414-0), P489, DOI 10.1109/CMPCON.1994.282878
  • [20] Energy Types
    Cohen, Michael
    Zhu, Haitao Steve
    Emgin, Senem Ezgi
    Liu, Yu David
    [J]. ACM SIGPLAN NOTICES, 2012, 47 (10) : 831 - 849