Effectiveness of android obfuscation on evading anti-malware

M Chua, V Balachandran - Proceedings of the eighth ACM conference …, 2018 - dl.acm.org
Obfuscation techniques have been conventionally used for legitimate applications, including
preventing application reverse engineering, tampering and protecting intellectual property. A …

Catch me if you can: Evaluating android anti-malware against transformation attacks

V Rastogi, Y Chen, X Jiang - IEEE Transactions on Information …, 2013 - ieeexplore.ieee.org
Mobile malware threats (eg, on Android) have recently become a real concern. In this paper,
we evaluate the state-of-the-art commercial mobile anti-malware products for Android and …

Stealth attacks: An extended insight into the obfuscation effects on android malware

D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto - Computers & Security, 2015 - Elsevier
In order to effectively evade anti-malware solutions, Android malware authors are
progressively resorting to automatic obfuscation strategies. Recent works have shown, on …

Cybercrime specialization: An exposé of a malicious Android Obfuscation-as-a-Service

V Šembera, M Paquet-Clouston… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Malware authors constantly obfuscate their files and defenders regularly develop new
techniques to detect them. Given this cat-and-mouse game, specialized obfuscation services …

Droidchameleon: evaluating android anti-malware against transformation attacks

V Rastogi, Y Chen, X Jiang - Proceedings of the 8th ACM SIGSAC …, 2013 - dl.acm.org
Mobile malware threats have recently become a real concern. In this paper, we evaluate the
state-of-the-art commercial mobile antimalware products for Android and test how resistant …

A large-scale empirical study on the effects of code obfuscations on android apps and anti-malware products

M Hammad, J Garcia, S Malek - … of the 40th international conference on …, 2018 - dl.acm.org
The Android platform has been the dominant mobile platform in recent years resulting in
millions of apps and security threats against those apps. Anti-malware products aim to …

Android code protection via obfuscation techniques: past, present and future directions

P Faruki, H Fereidooni, V Laxmi, M Conti… - arXiv preprint arXiv …, 2016 - arxiv.org
Mobile devices have become ubiquitous due to centralization of private user information,
contacts, messages and multiple sensors. Google Android, an open-source mobile …

Understanding android obfuscation techniques: A large-scale investigation in the wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu… - Security and privacy in …, 2018 - Springer
Program code is a valuable asset to its owner. Due to the easy-to-reverse nature of Java,
code protection for Android apps is of particular importance. To this end, code obfuscation is …

[PDF][PDF] A study on obfuscation techniques for android malware

M Pomilia - Sapienza University of Rome, 2016 - midlab.diag.uniroma1.it
In the last years more and more often obfuscation techniques are used on malware to evade
the detection of static analysis tools. This problem was already mentioned and studied in …

Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology

MD Preda, F Maggi - Journal of Computer Virology and Hacking …, 2017 - Springer
The authors of mobile-malware have started to leverage program protection techniques to
circumvent anti-viruses, or simply hinder reverse engineering. In response to the diffusion of …