FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps.

Balakrishnan Dharmalingam,Anyi Liu, Subra Ganesan, Sankardas Roy

IEEE International Conference on Electro/Information Technology (EIT)(2022)

引用 0|浏览1
暂无评分
摘要
Software reverse engineering has been applied widely by analyzing software for identifying vulnerabilities and hidden functionalities, primarily without the source code. It also opens the door for malicious analyzers to learn intellectual properties, steal confidential algorithms, and potentially launch exploits against software, commonly known as reverse engineering attacks (REAs). To thwart capabilities and mitigate the effects of possible REAs, various obfuscation technologies were introduced as countermeasures and have proven their effectiveness. However, most existing technologies either obfuscate the whole software piece or the code of interest. In this paper, we present FineObfuscator, a context-sensitive system that obfuscates a significantly limited number of components in a software package and still effectively thwarts REAs. Specificaly, FineObfuscator statically analyzes the software in terms of Control Flow Graph (CFG) and inter-procedural control flow graphs (ICFGs), identifies the code snippet in critical components, obfuscates the critical components with the goal of defeating REAs. This scheme allows the obfuscation to be performed at a more fine-grained level. Furthermore, FineObfuscator accepts a collection of obfuscation policies, which allow software developers to construct a customized obfuscation strategy. We evaluate the effectiveness of FineObfuscator against some well-referred Android repositories and generate promising results with significantly fewer computing resources, compared with existing obfuscation tools.
更多
查看译文
关键词
Mobile Apps,Backward Slicing,Call Graph,Control Flow Graph,Reverse Engineering,Obfuscation
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要