2018
DOI: 10.1007/978-3-030-01701-9_10
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

Abstract: Program code is a precious asset to its owner. Due to the easyto-reverse nature of Java, code protection for Android apps is of particular importance. To this end, code obfuscation is widely utilized by both legitimate app developers and malware authors, which complicates the representation of source code or machine code in order to hinder the manual investigation and code analysis. Despite many previous studies focusing on the obfuscation techniques, however, our knowledge on how obfuscation is applied by rea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
53
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 72 publications
(56 citation statements)
references
References 27 publications
2
53
1
Order By: Relevance
“…Finally, in a pre-print concurrent with our work, Dong et al also investigate the use of obfuscation in the Android ecosystem [16]. While that work is solely focused on technical measurements of obfuscation (similar in focus to our Sections 3 and 4), our research works with the developers responsible for obfuscation to determine the root causes of why apps are or are not obfuscated.…”
Section: Related Workmentioning
confidence: 95%
“…Finally, in a pre-print concurrent with our work, Dong et al also investigate the use of obfuscation in the Android ecosystem [16]. While that work is solely focused on technical measurements of obfuscation (similar in focus to our Sections 3 and 4), our research works with the developers responsible for obfuscation to determine the root causes of why apps are or are not obfuscated.…”
Section: Related Workmentioning
confidence: 95%
“…We manually investigate the activity names and observe that most of activity names have semantic meanings. However, Android obfuscation techniques are often used in Google Play apps to protect their security [49]. The activity names will be translated to simple words like "a," "b," and "c," totally losing their practical semantic meanings.…”
Section: Semantic Name Inferringmentioning
confidence: 99%
“…PackedApps. We obtained this dataset from Dong et al, [11] which consists of 1,500 and 1,371 packedoriginal APK wrapped in another APK-benign and malicious APKs, respectively.…”
Section: Dataset In Usementioning
confidence: 99%
“…To reduce the resource required in performing dynamic analysis, a large body of works [23,4,8] perform static code analysis to detect malware component in Android apps. However, due recent development in obfuscation techniques and malware developers' affinity to obfuscate their apps [11], static analysis of Android malware apps is an active research topic. CrowDroid [7] performed dynamic analysis apps network traces to detect malware activities of Android apps.…”
Section: Related Workmentioning
confidence: 99%