A Large Scale Investigation of Obfuscation Use in Google Play
نویسندگان
چکیده
Android applications are frequently plagiarized or maliciously repackaged, and soware obfuscation is a popular protection against these practices. In this study, we present the rst comprehensive analysis of the use and challenges of soware obfuscation in Android applications. We surveyed 308 Google Play developers about their experiences with obfuscation, nding that the free ProGuard soware is by far the most commonly used obfuscation tool. With this insight, we analyzed 1.7 million Android apps from Google Play, nding that only 24.9% of apps are obfuscated by the primary developer. is is surprising, given that the most common integrated development environment for Android, Android Studio, includes ProGuard by default. We investigated root causes of this low rate of obfuscation in an in-depth study with 79 Google Play developers, assessing their experiences with obfuscation and asking them to obfuscate a sample app using ProGuard. We found that while developers feel that apps in general are at risk of malicious repackaging or plagiarism, they do not fear the of their own intellectual property. Developers also report diculties applying obfuscation for their own apps, which was substantiated when they demonstrated problems with all but the most basic congurations to obfuscate our sample app. Our ndings indicate that more work is needed to make the application of obfuscation more usable and to educate developers on the risk of their apps being reverse engineered, their intellectual property stolen and their apps being repackaged and redistributed as malware.
منابع مشابه
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
Program code is a precious asset to its owner. Due to the easyto-reverse nature of Java, code protection for Android apps is of particular importance. To this end, code obfuscation is widely utilized by both legitimate app developers andmalware authors, which complicates the representation of source code or machine code in order to hinder the manual investigation and code analysis. Despite many...
متن کاملASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...
متن کاملA New Play-off Approach in League Championship Algorithm for Solving Large-Scale Support Vector Machine Problems
There are many numerous methods for solving large-scale problems in which some of them are very flexible and efficient in both linear and non-linear cases. League championship algorithm is such algorithm which may be used in the mentioned problems. In the current paper, a new play-off approach will be adapted on league championship algorithm for solving large-scale problems. The proposed algori...
متن کاملA Large-Scale Empirical Study on the Effects of Code Obfuscations on Android Apps and Anti-Malware Products
The Android platform has been the dominant mobile platform in recent years resulting inmillions of apps and security threats against those apps. Anti-malware products aim to protect smartphone users from these threats, especially frommalicious apps. However, malware authors use code obfuscation on their apps to evade detection by anti-malware products. To assess the effects of code obfuscation ...
متن کاملInvestigation of land use changes in Gorganrood catchment using Google Earth Engine platform
The purpose of this study is to investigate landuse changes in Gorganrood basin in 2001, 2010 and 2019. Using Landsat and Product-Modes satellite images, used maps were prepared using the classification method of random forest algorithm in Google Earth Engine. Satellite imagery was classified into eight classes including forest, cropland, shrubland, grassland, wetland, urban, barren, and water....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1801.02742 شماره
صفحات -
تاریخ انتشار 2018