Proceedings of the 34th Annual Computer Security Applications Conference 2018
DOI: 10.1145/3274694.3274726
|View full text |Cite
|
Sign up to set email alerts
|

A Large Scale Investigation of Obfuscation Use in Google Play

Abstract: Android applications are frequently plagiarized or repackaged, and software obfuscation is a recommended protection against these practices. However, there is very little data on the overall rates of app obfuscation, the techniques used, or factors that lead to developers to choose to obfuscate their apps. In this paper, we present the first comprehensive analysis of the use of and challenges to software obfuscation in Android applications. We analyzed 1.7 million free Android apps from Google Play to detect v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
48
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 68 publications
(50 citation statements)
references
References 49 publications
(69 reference statements)
1
48
1
Order By: Relevance
“…To study the obfuscation of the 3PLs, we analyze their source codes with jd-gui, a tool that transforms Java bytecodes into source codes. We find that although obfuscation is widely adopted in 3PLs (accounting for 60%), the obfuscation does not affect their entry methods, which is corroborated by Wermke et al 38 The reason is straightforward. If the name of the entry method is obfuscated, the host app would not be able to know how to start the 3PL.…”
Section: Discussionsupporting
confidence: 83%
“…To study the obfuscation of the 3PLs, we analyze their source codes with jd-gui, a tool that transforms Java bytecodes into source codes. We find that although obfuscation is widely adopted in 3PLs (accounting for 60%), the obfuscation does not affect their entry methods, which is corroborated by Wermke et al 38 The reason is straightforward. If the name of the entry method is obfuscated, the host app would not be able to know how to start the 3PL.…”
Section: Discussionsupporting
confidence: 83%
“…We also find that the use of obfuscation techniques dramatically increased since the early days of Android malware, with specimens nowadays pervasively using native code and including external scripts to avoid easy analysis. This contrasts with the amount of legitimate apps that are currently obfuscated-a recent investigation shows that less than 25% of apps in Google Play are obfuscated [47], while we show that over 90% of the riders have the ability to use advanced obfuscation techniques. A consequence of this is that antimalware systems trained on carriers and/or older datasets might not be effective in detecting the most recent threats, especially when they only rely on static analysis.…”
Section: Introductioncontrasting
confidence: 81%
“…We show that all forms of obfuscation are increasingly more popular in malware, with the usage of cryptography present in 90% of the families in 2017. When putting this in perspective with respect to legitimate apps [47], we show sharp increase in the use these techniques. Discussions about the attribution of certain behaviors such as the use of obfuscation to repackaged malware have been recurrent in literature over the last few years [29].…”
Section: B Key Findingsmentioning
confidence: 95%
See 2 more Smart Citations