2016
DOI: 10.1016/j.cose.2016.05.003
|View full text |Cite
|
Sign up to set email alerts
|

Control flow obfuscation for Android applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
25
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 52 publications
(25 citation statements)
references
References 8 publications
0
25
0
Order By: Relevance
“…As an extension of the application, Lyceum also provides a mobile application that enables distant learning by accessing the content directly live through personal mobile phones. The mobile application is secured with latest obfuscation techniques [5] so that the contents are secure while transmitted. Even though the functionality is appealing, currently the mobile application is used for broadcasting information to parents.…”
Section: Lyceum Mobile Applicationmentioning
confidence: 99%
“…As an extension of the application, Lyceum also provides a mobile application that enables distant learning by accessing the content directly live through personal mobile phones. The mobile application is secured with latest obfuscation techniques [5] so that the contents are secure while transmitted. Even though the functionality is appealing, currently the mobile application is used for broadcasting information to parents.…”
Section: Lyceum Mobile Applicationmentioning
confidence: 99%
“…Vivek Bala et al [27] analyzed the need for potent controlflow based obfuscation so as to help protect Android apps. they also have described the design and implementation of three control-flow obfuscations for Android apps at the Dalvik bytecode level, which go beyond simp control-flow transformations used by exiting Android obfuscators.…”
Section: Related Workmentioning
confidence: 99%
“…e disadvantage of this method is that the malware could identify it using the code decoding. e signal method is an obfuscation method in which control flow graph opcodes (operation codes) are hidden [8][9][10]. e advantage of this method is that it hides the control flow graph of a program and makes the information of the control flow graph of the program difficult [11][12][13].…”
Section: Introductionmentioning
confidence: 99%