2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC) 2018
DOI: 10.1109/icaecc.2018.8479507
|View full text |Cite
|
Sign up to set email alerts
|

Code obfuscating a Kotlin-based App with Proguard

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…Ionic provides efficient performance with minimal DOM manipulation. This framework includes a command-line interface that lets you build Android [11,12,13,14,15] and iOS apps, saving you the hassle of programming. The Ionic framework mainly focuses on the front-end user experience or UI interactions that take care of the overall look and feel of the App.…”
Section: Ionic Frameworkmentioning
confidence: 99%
“…Ionic provides efficient performance with minimal DOM manipulation. This framework includes a command-line interface that lets you build Android [11,12,13,14,15] and iOS apps, saving you the hassle of programming. The Ionic framework mainly focuses on the front-end user experience or UI interactions that take care of the overall look and feel of the App.…”
Section: Ionic Frameworkmentioning
confidence: 99%
“…In the same year, [9][10] [11][12] [13][23] also improved the obfuscation technique by using similarity analysis to detect repackaged apps. [14] used an obfuscation technique in the Kotlin programming language, which is a new language in Android application development, and in 2019, [15] used an obfuscated logic bomb which will be triggered when the application has been modified.…”
Section: Related Workmentioning
confidence: 99%
“…Shah et al [17] have studied the usage of Proguard, an obfuscator tool, to prevent App Repacking attacks. The authors showed that by using Proguard to obfuscate the published application, the decompiled code becomes much harder to read and understand for attackers.…”
Section: Related Workmentioning
confidence: 99%