About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II

Research Article

An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs

Download(Requires a free EAI acccount)
803 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-23802-9_24,
        author={Felix Freiling and Mykola Protsenko and Yan Zhuang},
        title={An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II},
        proceedings_a={SECURECOMM},
        year={2015},
        month={12},
        keywords={Software obfuscation Mobile security Android Software protection Reverse engineering Software metrics},
        doi={10.1007/978-3-319-23802-9_24}
    }
    
  • Felix Freiling
    Mykola Protsenko
    Yan Zhuang
    Year: 2015
    An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23802-9_24
Felix Freiling1,*, Mykola Protsenko1,*, Yan Zhuang1,*
  • 1: Friedrich-Alexander University Erlangen-Nürnberg (FAU)
*Contact email: felix.freiling@cs.fau.de, mykola.protsenko@cs.fau.de, yan.zhuang@cs.fau.de

Abstract

We investigate the problem of creating complex software obfuscation for mobile applications. We construct complex software obfuscation from sequentially applying simple software obfuscation methods. We define several desirable and undesirable properties of such transformations, including idempotency and monotonicity. We empirically evaluate a set of 7 obfuscation methods on 240 Android Packages (APKs). We show that many obfuscation methods are idempotent or monotonous.

Keywords
Software obfuscation Mobile security Android Software protection Reverse engineering Software metrics
Published
2015-12-03
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-23802-9_24
Copyright © 2014–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL