دورية أكاديمية

Exploring Android Obfuscators and Deobfuscators: An Empirical Investigation.

التفاصيل البيبلوغرافية
العنوان: Exploring Android Obfuscators and Deobfuscators: An Empirical Investigation.
المؤلفون: Ebad, Shouki A., Darem, Abdulbasit A.
المصدر: Electronics (2079-9292); Jun2024, Vol. 13 Issue 12, p2272, 15p
مصطلحات موضوعية: PROGRAMMING languages, COMPUTER science, RESEARCH personnel, ACADEMIC programs, SMARTPHONES, SALINE injections
مستخلص: Researchers have proposed different obfuscation transformations supported by numerous smartphone protection tools (obfuscators and deobfuscators). However, there is a need for a comprehensive study to empirically characterize these tools that belong to different categories of transformations. We propose a property-based framework to systematically classify twenty cutting-edge tools according to their features, analysis type, programming language support, licensing, applied obfuscation transformations, and general technical drawbacks. Our analysis predominantly reveals that very few tools work at the dynamic level, and most tools (which are static-based) work for Java or Java-based ecosystems (e.g., Android). The findings also show that the widespread adoption of renaming transformations is followed by formatting and code injection. In addition, this paper pinpoints the technical shortcomings of each tool; some of these drawbacks are common in static-based analyzers (e.g., resource consumption), and other drawbacks have negative effects on the experiment conducted by students (e.g., a third-party library involved). According to these critical limitations, we provide some timely recommendations for further research. This study can assist not only Android developers and researchers to improve the overall health of their apps but also the managers of computer science and cybersecurity academic programs to embed suitable obfuscation tools in their curricula. [ABSTRACT FROM AUTHOR]
Copyright of Electronics (2079-9292) is the property of MDPI and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:20799292
DOI:10.3390/electronics13122272