Understanding android obfuscation techniques: A large-scale investigation in the wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu… - Security and privacy in …, 2018 - Springer
… According to such statistics, we have two immediate findings: … of bitwise arithmetic operations,
memory fetch patterns and so on, besides, the dynamic binary instrument is also widely-…

Exploring end user preferences for location obfuscation, location-based services, and the value of location

AJB Brush, J Krumm, J Scott - Proceedings of the 12th ACM international …, 2010 - dl.acm.org
… that it assumes that everyone is carrying a GPS device so that there would be people
available to mix your data with, and the size of the region would vary with population density. …

An obfuscation-based approach for protecting location privacy

CA Ardagna, M Cremonini… - … on Dependable and …, 2009 - ieeexplore.ieee.org
devices and the technical improvements of location … perturbation process, called obfuscation,
are i) to allow users to … a set of techniques robust against a relevant class of de-obfuscation

[图书][B] Obfuscation: A user's guide for privacy and protest

F Brunton, H Nissenbaum - 2015 - books.google.com
… : gentiles wearing the Yellow Star as an act of protest, providing a population into … devices
that trigger radar detectors' warning signals without actually measuring speed. These devices

Matching anonymized and obfuscated time series to users' profiles

N Takbiri, A Houmansadr, DL Goeckel… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
… But the measurements of power by such devices can be mapped to users and reveal their
lifestyle … of the overall population and thus we employ a simple distributed method in which the …

Android code protection via obfuscation techniques: past, present and future directions

P Faruki, H Fereidooni, V Laxmi, M Conti… - arXiv preprint arXiv …, 2016 - arxiv.org
… and analyze the obfuscation techniques used by malware … efficiency of the defense techniques
used for code protection. This … access the device files without the device user knowledge. …

ViewDroid: Towards obfuscation-resilient mobile application repackaging detection

F Zhang, H Huang, S Zhu, D Wu, P Liu - … of the 2014 ACM conference on …, 2014 - dl.acm.org
… In recent years, as the wide use and rapid development of mobile devices such as smartphones
and tablets, mobile application (app) markets are growing rapidly. There were over 1, …

Obfuscation of design intent in object-oriented applications

M Sosonkin, G Naumovich, N Memon - … of the 3rd ACM workshop on …, 2003 - dl.acm.org
… We describe three techniques for obfuscation of program design. The class coalescing
obfuscation replaces several classes with a single class. The class splitting obfuscation replaces …

You are your metadata: Identification and obfuscation of social media users using metadata information

B Perez, M Musolesi, G Stringhini - … AAAI Conference on Web and Social …, 2018 - ojs.aaai.org
… is the process by which we generalize from a sample a characteristic of the population. …
such as hardware statistics and system settings, to uniquely identify devices. Instead, the …

Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
… hidden program functionality, uncover firmware features that are disabled in low-cost devices
Heuristicsand statistics-based strategies are used to determine the exact moment when the …