Research Article
An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs
693 downloads
@INPROCEEDINGS{10.1007/978-3-319-23802-9_24, author={Felix Freiling and Mykola Protsenko and Yan Zhuang}, title={An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs}, proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II}, proceedings_a={SECURECOMM}, year={2015}, month={12}, keywords={Software obfuscation Mobile security Android Software protection Reverse engineering Software metrics}, doi={10.1007/978-3-319-23802-9_24} }
- Felix Freiling
Mykola Protsenko
Yan Zhuang
Year: 2015
An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs
SECURECOMM
Springer
DOI: 10.1007/978-3-319-23802-9_24
Abstract
We investigate the problem of creating complex software obfuscation for mobile applications. We construct complex software obfuscation from sequentially applying simple software obfuscation methods. We define several desirable and undesirable properties of such transformations, including idempotency and monotonicity. We empirically evaluate a set of 7 obfuscation methods on 240 Android Packages (APKs). We show that many obfuscation methods are idempotent or monotonous.
Copyright © 2014–2024 ICST