2013
DOI: 10.7840/kics.2013.38b.8.654
|View full text |Cite
|
Sign up to set email alerts
|

Structural and Functional Analyses of ProGuard Obfuscation Tool

Abstract: Android applications can be easily decompiled owing to their structural characteristics, in which applications are developed using Java and are self-signed so that applications modified in this way can be repackaged. It will be crucial that this inherent vulnerability may be used to an increasing number of Android-based financial service applications, including banking applications. Thus, code obfuscation techniques are used as one of solutions to protect applications against their forgery. Currently, many of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 1 publication
0
2
0
1
Order By: Relevance
“…It makes an analyzer need much time to understand the logic. There are various techniques for code obfuscation in Java layer such as class and method renaming, control flow manipulation, string encryption, class encryption, and API hiding [6]. Of course, similar techniques are used in native layer.…”
Section: Code Obfuscationmentioning
confidence: 99%
See 1 more Smart Citation
“…It makes an analyzer need much time to understand the logic. There are various techniques for code obfuscation in Java layer such as class and method renaming, control flow manipulation, string encryption, class encryption, and API hiding [6]. Of course, similar techniques are used in native layer.…”
Section: Code Obfuscationmentioning
confidence: 99%
“…However, some malicious applications take long time for analysis because of their antianalysis techniques such as antidebugging, antidecompiling, and antitamper which have been originally developed for protecting property of applications [6,7]. Particularly sophisticated malicious applications have been recently found.…”
Section: Introductionmentioning
confidence: 99%
“…[10,12] . 에 널리 이용되고 있는 난독화 도구인 프로가드 [14] 와 JODE [15] , RetroGuard [16] , jarg [17] , yGuard [18] 는 메소 드, 클래스 식별자 변환 기법을 지원하고, 도구에 따 라 필드 등 추가적인 식별자 변환 기법을 지원하기도 한다.…”
unclassified