Control flow obfuscation for Android applications

Page view(s)
0
Checked on
Control flow obfuscation for Android applications
Title:
Control flow obfuscation for Android applications
Journal Title:
Computers & Security
OA Status:
closed
Keywords:
Publication Date:
19 May 2016
Citation:
Vivek Balachandran, Sufatrio, Darell J.J. Tan, Vrizlynn L.L. Thing, Control flow obfuscation for Android applications, Computers & Security, Volume 61, August 2016, Pages 72-93, ISSN 0167-4048, http://dx.doi.org/10.1016/j.cose.2016.05.003.
Abstract:
Android apps are vulnerable to reverse engineering, which makes app tampering and repackaging relatively easy. While obfuscation is widely known to make reverse engineering harder, complex and effective control flow obfuscations by rearranging Android bytecode instructions have not been implemented in various Android obfuscation tools. This paper presents our control-flow obfuscation techniques for Android apps at the Dalvik bytecode level. Our three proposed schemes go beyond simple control-flow transformations employed by existing Android obfuscators, and make it difficult for static analysis to determine the actual app control flows. To realize this, we also address a previously-unsolved register-type conflict problem that can be raised by the verifier module of the Android runtime system by means of a type separation technique. Our analysis and experimentation show that the schemes can offer effective obfuscation with reasonable performance and size overheads. Combined with the existing data and layout obfuscation techniques, our schemes can offer attractive measures to hinder reverse engineering and code analysis on Android apps, and help safeguard Android app developers' heavy investment in their apps.
License type:
http://creativecommons.org/licenses/by-nc-nd/4.0/
Funding Info:
Description:
ISSN:
0167-4048
Files uploaded: