Understanding android obfuscation techniques: A large-scale investigation in the wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu… - Security and privacy in …, 2018 - Springer
Program code is a valuable asset to its owner. Due to the easy-to-reverse nature of Java,
code protection for Android apps is of particular importance. To this end, code obfuscation is …

[PDF][PDF] Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen… - researchgate.net
Program code is a precious asset to its owner. Due to the easyto-reverse nature of Java,
code protection for Android apps is of particular importance. To this end, code obfuscation is …

[PDF][PDF] Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen… - faculty.sites.uci.edu
Program code is a valuable asset to its owner. Due to the easy-to-reverse nature of Java,
code protection for Android apps is of particular importance. To this end, code obfuscation is …

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu… - arXiv e …, 2018 - ui.adsabs.harvard.edu
In this paper, we seek to better understand Android obfuscation and depict a holistic view of
the usage of obfuscation through a large-scale investigation in the wild. In particular, we …

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu… - arXiv preprint arXiv …, 2018 - arxiv.org
In this paper, we seek to better understand Android obfuscation and depict a holistic view of
the usage of obfuscation through a large-scale investigation in the wild. In particular, we …

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen… - 2018 - escholarship.org
In this paper, we seek to better understand Android obfuscation and depict a holistic view of
the usage of obfuscation through a large-scale investigation in the wild. In particular, we …

[PDF][PDF] Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen… - diaowenrui.github.io
Program code is a valuable asset to its owner. Due to the easy-to-reverse nature of Java,
code protection for Android apps is of particular importance. To this end, code obfuscation is …

[PDF][PDF] Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen… - staff.ie.cuhk.edu.hk
Program code is a precious asset to its owner. Due to the easyto-reverse nature of Java,
code protection for Android apps is of particular importance. To this end, code obfuscation is …

[PDF][PDF] Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen… - faculty.sites.uci.edu
Program code is a valuable asset to its owner. Due to the easy-to-reverse nature of Java,
code protection for Android apps is of particular importance. To this end, code obfuscation is …

[PDF][PDF] Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen… - researchgate.net
Program code is a valuable asset to its owner. Due to the easy-to-reverse nature of Java,
code protection for Android apps is of particular importance. To this end, code obfuscation is …