2022
DOI: 10.7717/peerj-cs.1002
|View full text |Cite
|
Sign up to set email alerts
|

On the evaluation of android malware detectors against code-obfuscation techniques

Abstract: The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques. The obfuscation techniques are used to hide the malicious code in the Android applications to evade detection by anti-malware tools. Some attackers use the obfuscation techniques in isolation, while some attackers use a mixed approach (i.e., employing multiple obfuscation techniq… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…This investigation requires a deep analysis of the potentially dangerous applications 2 , therefore requiring a lightweight mechanism to cope with such a huge number of applications. Obfuscation of malware usually can be applied through several ways such as string encryption-based obfuscation, junk code insertion 3,4 , using fake try-catch statements 5 , repacking application 6,7 , call indirection 8 , code re-ordering 9 , package renaming 10 , native code obfuscation 11 , dynamic code loading 12 , code hiding 13 , reflection, etc. The variety and heterogeneous nature of the potential obfuscation techniques make them extremely difficult to identify.…”
Section: Evaluation and Classification Of Obfuscated Android Malware ...mentioning
confidence: 99%
“…This investigation requires a deep analysis of the potentially dangerous applications 2 , therefore requiring a lightweight mechanism to cope with such a huge number of applications. Obfuscation of malware usually can be applied through several ways such as string encryption-based obfuscation, junk code insertion 3,4 , using fake try-catch statements 5 , repacking application 6,7 , call indirection 8 , code re-ordering 9 , package renaming 10 , native code obfuscation 11 , dynamic code loading 12 , code hiding 13 , reflection, etc. The variety and heterogeneous nature of the potential obfuscation techniques make them extremely difficult to identify.…”
Section: Evaluation and Classification Of Obfuscated Android Malware ...mentioning
confidence: 99%