Abusing Android Runtime for Application Obfuscation - Archive ouverte HAL Access content directly
Conference Papers Year :

Abusing Android Runtime for Application Obfuscation

Abstract

Studying Android obfuscation techniques is an essential task for understanding and analyzing malicious applications. Obfuscation techniques have already been extensively studied for market applications but never for pre-compiled applications used in smartphone firmwares. In this paper, we describe two new obfuscation techniques that take advantage of the duality between assembly and Dalvik bytecode and, as far as we know, have never been described before. We also propose detection methods for these obfuscation techniques. We apply them to vendor firmwares and market applications in order to evaluate their usage in the wild. We found that even if they do not seem to be already used in the wild, they are fully practical.
Fichier principal
Vignette du fichier
bfo-camera.pdf (193.13 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-02877815 , version 1 (22-06-2020)

Identifiers

Cite

Pierre Graux, Jean-François Lalande, Pierre Wilke, Valérie Viet Triem Tong. Abusing Android Runtime for Application Obfuscation. SAD 2020 - Workshop on Software Attacks and Defenses, Sep 2020, Genova, Italy. pp.616-624, ⟨10.1109/EuroSPW51379.2020.00089⟩. ⟨hal-02877815⟩
143 View
562 Download

Altmetric

Share

Gmail Facebook Twitter LinkedIn More