Abusing android runtime for application obfuscation

P Graux, JF Lalande, P Wilke… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Studying Android obfuscation techniques is an essential task for understanding and
analyzing malicious applications. Obfuscation techniques have already been extensively …

Cybercrime specialization: An exposé of a malicious Android Obfuscation-as-a-Service

V Šembera, M Paquet-Clouston… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Malware authors constantly obfuscate their files and defenders regularly develop new
techniques to detect them. Given this cat-and-mouse game, specialized obfuscation services …

Effectiveness of android obfuscation on evading anti-malware

M Chua, V Balachandran - Proceedings of the eighth ACM conference …, 2018 - dl.acm.org
Obfuscation techniques have been conventionally used for legitimate applications, including
preventing application reverse engineering, tampering and protecting intellectual property. A …

Understanding android obfuscation techniques: A large-scale investigation in the wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu… - Security and privacy in …, 2018 - Springer
Program code is a valuable asset to its owner. Due to the easy-to-reverse nature of Java,
code protection for Android apps is of particular importance. To this end, code obfuscation is …

DexMonitor: dynamically analyzing and monitoring obfuscated Android applications

H Cho, JH Yi, GJ Ahn - IEEE Access, 2018 - ieeexplore.ieee.org
Both Android application developers and malware authors use sophisticated obfuscation
tools to prevent their mobile applications from being repackaged and analyzed. These tools …

FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps

B Dharmalingam, A Liu, S Ganesan… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Software reverse engineering has been applied widely by analyzing software for identifying
vulnerabilities and hidden functionalities, primarily without the source code. It also opens the …

Characterizing the Use of Code Obfuscation in Malicious and Benign Android Apps

U Kargén, N Mauthe, N Shahmehri - Proceedings of the 18th …, 2023 - dl.acm.org
Obfuscation is frequently used by both benign and malicious Android apps. Since static
analysis of obfuscated apps often produces incomplete or misleading results, the problems …

Tackling runtime-based obfuscation in android with {TIRO}

MY Wong, D Lie - 27th USENIX security symposium (USENIX security …, 2018 - usenix.org
Obfuscation is used in malware to hide malicious activity from manual or automatic program
analysis. On the Android platform, malware has had a history of using obfuscation …

Android code protection via obfuscation techniques: past, present and future directions

P Faruki, H Fereidooni, V Laxmi, M Conti… - arXiv preprint arXiv …, 2016 - arxiv.org
Mobile devices have become ubiquitous due to centralization of private user information,
contacts, messages and multiple sensors. Google Android, an open-source mobile …

Statistical deobfuscation of android applications

B Bichsel, V Raychev, P Tsankov… - Proceedings of the 2016 …, 2016 - dl.acm.org
This work presents a new approach for deobfuscating Android APKs based on probabilistic
learning of large code bases (termed" Big Code"). The key idea is to learn a probabilistic …