On the effectiveness of code-reuse-based Android application obfuscation
Attackers use reverse engineering techniques to gain detailed understanding of executable for malicious purposes, such as re-packaging an Android app to inject malicious code or advertising components. To make reverse engineering more difficult, researchers have proposed various code obfuscation tec...
Saved in:
Main Authors: | TANG, Xiaoxiao, LIANG, Yu, MA, Xinjie, LIN, Yan, GAO, Debin |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3426 https://ink.library.smu.edu.sg/context/sis_research/article/4427/viewcontent/Ontheeffectivenessofcode_reuse_based.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
DynOpVm: VM-based software obfuscation with dynamic opcode mapping
by: CHENG, Xiaoyang, et al.
Published: (2019) -
Integrated software fingerprinting via neural-network-based control flow obfuscation
by: MA, Haoyu, et al.
Published: (2016) -
Linear Obfuscation to Combat Symbolic Execution
by: WANG, Zhi, et al.
Published: (2011) -
TAD : time side-channel attack defense of obfuscated source code
by: Fell, Alexander, et al.
Published: (2021) -
FA3: Fine-Grained Android Application Analysis
by: LIN, Yan, et al.
Published: (2023)