Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations

نویسندگان

چکیده

Android obfuscation techniques include not only classic code that were adapted to Android, but also methods target the platform specifically. This work examines status-quo of obfuscation, detection and deobfuscation. Specifically, it first summarizes approaches are commonly used by app developers for optimization, protect their software against theft tampering frequently misused malware circumvent anti-malware products. Secondly, article focuses on presents various available tools current research. Thirdly, deobfuscation (which aims at reinstating original state before obfuscation) is discussed followed a brief discussion how this impacts forensic investigation. We conclude although widely in development (benign malicious), practices deal with standardized, so inherently lacking from standpoint.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Effectiveness of Code-Reuse-Based Android Application Obfuscation

Attackers use reverse engineering techniques to gain detailed understanding of executable for malicious purposes, such as re-packaging an Android app to inject malicious code or advertising components. To make reverse engineering more difficult, researchers have proposed various code obfuscation techniques to conceal purposes or logic of code segments. One interesting idea of code obfuscation i...

متن کامل

Deobfuscation of Packed and Virtualization-Obfuscation Protected Binaries

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 CHAPTER

متن کامل

Securing Android Code Using White Box Cryptography and Obfuscation Techniques

Code obfuscation is a set of program transformations that make program code and program execution difficult to analyze. First of all, obfuscation hinders manual inspection of program internals. By renaming variables and functions, and breaking down structures, it protects against reverse-engineering. It protects both storage and usage of keys, and it can hide certain properties such as a softwa...

متن کامل

Survey on Cryptographic Obfuscation

The recent result of Garg et al. (FOCS 2013) changed the previously pessimistic attitude towards general purpose cryptographic obfuscation. Since their first candidate construction, several authors proposed newer and newer schemes with more persuasive security arguments and better efficiency. At the same time, indistinguishability obfuscation proved its extreme usefulness by becoming the basis ...

متن کامل

A Self-Compiling Android Data Obfuscation Tool

Smartphones are becoming more significant in storing and transferring data. However, techniques ensuring this data is not compromised after a confiscation of the device are not readily available. DroidStealth is an open source Android application which combines data encryption and application obfuscation techniques to provide users with a way to securely hide content on their smartphones. This ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Forensic Science International: Digital Investigation

سال: 2021

ISSN: ['2666-2825', '2666-2817']

DOI: https://doi.org/10.1016/j.fsidi.2021.301285