Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations
نویسندگان
چکیده
Android obfuscation techniques include not only classic code that were adapted to Android, but also methods target the platform specifically. This work examines status-quo of obfuscation, detection and deobfuscation. Specifically, it first summarizes approaches are commonly used by app developers for optimization, protect their software against theft tampering frequently misused malware circumvent anti-malware products. Secondly, article focuses on presents various available tools current research. Thirdly, deobfuscation (which aims at reinstating original state before obfuscation) is discussed followed a brief discussion how this impacts forensic investigation. We conclude although widely in development (benign malicious), practices deal with standardized, so inherently lacking from standpoint.
منابع مشابه
On the Effectiveness of Code-Reuse-Based Android Application Obfuscation
Attackers use reverse engineering techniques to gain detailed understanding of executable for malicious purposes, such as re-packaging an Android app to inject malicious code or advertising components. To make reverse engineering more difficult, researchers have proposed various code obfuscation techniques to conceal purposes or logic of code segments. One interesting idea of code obfuscation i...
متن کاملDeobfuscation of Packed and Virtualization-Obfuscation Protected Binaries
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 CHAPTER
متن کاملSecuring Android Code Using White Box Cryptography and Obfuscation Techniques
Code obfuscation is a set of program transformations that make program code and program execution difficult to analyze. First of all, obfuscation hinders manual inspection of program internals. By renaming variables and functions, and breaking down structures, it protects against reverse-engineering. It protects both storage and usage of keys, and it can hide certain properties such as a softwa...
متن کاملSurvey on Cryptographic Obfuscation
The recent result of Garg et al. (FOCS 2013) changed the previously pessimistic attitude towards general purpose cryptographic obfuscation. Since their first candidate construction, several authors proposed newer and newer schemes with more persuasive security arguments and better efficiency. At the same time, indistinguishability obfuscation proved its extreme usefulness by becoming the basis ...
متن کاملA Self-Compiling Android Data Obfuscation Tool
Smartphones are becoming more significant in storing and transferring data. However, techniques ensuring this data is not compromised after a confiscation of the device are not readily available. DroidStealth is an open source Android application which combines data encryption and application obfuscation techniques to provide users with a way to securely hide content on their smartphones. This ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Forensic Science International: Digital Investigation
سال: 2021
ISSN: ['2666-2825', '2666-2817']
DOI: https://doi.org/10.1016/j.fsidi.2021.301285