A Large Scale Investigation of Obfuscation Use in Google Play

نویسندگان

  • Dominik Wermke
  • Nicolas Huaman
  • Yasemin Acar
  • Bradley Reaves
  • Patrick Traynor
  • Sascha Fahl
چکیده

Android applications are frequently plagiarized or maliciously repackaged, and so‰ware obfuscation is a popular protection against these practices. In this study, we present the €rst comprehensive analysis of the use and challenges of so‰ware obfuscation in Android applications. We surveyed 308 Google Play developers about their experiences with obfuscation, €nding that the free ProGuard so‰ware is by far the most commonly used obfuscation tool. With this insight, we analyzed 1.7 million Android apps from Google Play, €nding that only 24.9% of apps are obfuscated by the primary developer. Œis is surprising, given that the most common integrated development environment for Android, Android Studio, includes ProGuard by default. We investigated root causes of this low rate of obfuscation in an in-depth study with 79 Google Play developers, assessing their experiences with obfuscation and asking them to obfuscate a sample app using ProGuard. We found that while developers feel that apps in general are at risk of malicious repackaging or plagiarism, they do not fear the‰ of their own intellectual property. Developers also report diculties applying obfuscation for their own apps, which was substantiated when they demonstrated problems with all but the most basic con€gurations to obfuscate our sample app. Our €ndings indicate that more work is needed to make the application of obfuscation more usable and to educate developers on the risk of their apps being reverse engineered, their intellectual property stolen and their apps being repackaged and redistributed as malware.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

Program code is a precious asset to its owner. Due to the easyto-reverse nature of Java, code protection for Android apps is of particular importance. To this end, code obfuscation is widely utilized by both legitimate app developers andmalware authors, which complicates the representation of source code or machine code in order to hinder the manual investigation and code analysis. Despite many...

متن کامل

ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

متن کامل

A New Play-off Approach in League Championship Algorithm for Solving Large-Scale Support Vector Machine Problems

There are many numerous methods for solving large-scale problems in which some of them are very flexible and efficient in both linear and non-linear cases. League championship algorithm is such algorithm which may be used in the mentioned problems. In the current paper, a new play-off approach will be adapted on league championship algorithm for solving large-scale problems. The proposed algori...

متن کامل

A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android Apps and Anti-Malware Products

The Android platform has been the dominant mobile platform in recent years resulting inmillions of apps and security threats against those apps. Anti-malware products aim to protect smartphone users from these threats, especially frommalicious apps. However, malware authors use code obfuscation on their apps to evade detection by anti-malware products. To assess the effects of code obfuscation ...

متن کامل

Investigation of land use changes in Gorganrood catchment using Google Earth Engine platform

The purpose of this study is to investigate landuse changes in Gorganrood basin in 2001, 2010 and 2019. Using Landsat and Product-Modes satellite images, used maps were prepared using the classification method of random forest algorithm in Google Earth Engine. Satellite imagery was classified into eight classes including forest, cropland, shrubland, grassland, wetland, urban, barren, and water....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1801.02742  شماره 

صفحات  -

تاریخ انتشار 2018