Exploring Android Obfuscators and Deobfuscators: An Empirical Investigation

Author:

Ebad Shouki A.1ORCID,Darem Abdulbasit A.1ORCID

Affiliation:

1. Department of Computer Science, Faculty of Science, Northern Border University, Arar 91431, Saudi Arabia

Abstract

Researchers have proposed different obfuscation transformations supported by numerous smartphone protection tools (obfuscators and deobfuscators). However, there is a need for a comprehensive study to empirically characterize these tools that belong to different categories of transformations. We propose a property-based framework to systematically classify twenty cutting-edge tools according to their features, analysis type, programming language support, licensing, applied obfuscation transformations, and general technical drawbacks. Our analysis predominantly reveals that very few tools work at the dynamic level, and most tools (which are static-based) work for Java or Java-based ecosystems (e.g., Android). The findings also show that the widespread adoption of renaming transformations is followed by formatting and code injection. In addition, this paper pinpoints the technical shortcomings of each tool; some of these drawbacks are common in static-based analyzers (e.g., resource consumption), and other drawbacks have negative effects on the experiment conducted by students (e.g., a third-party library involved). According to these critical limitations, we provide some timely recommendations for further research. This study can assist not only Android developers and researchers to improve the overall health of their apps but also the managers of computer science and cybersecurity academic programs to embed suitable obfuscation tools in their curricula.

Funder

Northern Border University, Arar, KSA

Publisher

MDPI AG

Reference20 articles.

1. Rauti, S., and Leppänen, V. (2018, January 26–27). A comparison of online JavaScript obfuscators. Proceedings of the 2018 International Conference on Software Security and Assurance (ICSSA), Seoul, Republic of Korea.

2. Measuring software obfuscation quality—A systematic literature review;Ebad;IEEE Access,2021

3. Sherif, A. (2024, June 08). Mobile Operating Systems—Statistics & Facts, 10 January 2024. Available online: https://www.statista.com/topics/3778/mobile-operating-systems/#topicOverview.

4. Wang, H., Li, H., Li, L., Guo, Y., and Xu, G. (June, January 27). Why are android apps removed from google play? A large-scale empirical study. Proceedings of the 15th International Conference on Mining Software Repositories, Gothenburg, Sweden.

5. Collberg, C., Thomborson, C., and Low, D. (1997). A Taxonomy of Obfuscating Transformations, Department Computer Science, University of Auckland. Available online: https://researchspace.auckland.ac.nz/bitstream/handle/2292/3491/TR148.pdf.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3