Control Flow Obfuscation Based Protection Method for Android Applications
With the popularization and rapid development of mobile intelligent terminals(MITs), the number of mobile applications, or apps, has increased exponentially. It is increasingly common for malicious code to be inserted into counterfeit apps, which can cause significant economic damage and threaten th...
Gespeichert in:
Veröffentlicht in: | China communications 2017-11, Vol.14 (11), p.247-259 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 259 |
---|---|
container_issue | 11 |
container_start_page | 247 |
container_title | China communications |
container_volume | 14 |
creator | Peng, Yong Su, Guanyu Tian, Bin Sun, Maohua Li, Qi |
description | With the popularization and rapid development of mobile intelligent terminals(MITs), the number of mobile applications, or apps, has increased exponentially. It is increasingly common for malicious code to be inserted into counterfeit apps, which can cause significant economic damage and threaten the security of users. Code obfuscation techniques are a highly efficient group of methods for code security protection. In this paper, we propose a novel control flow obfuscation based method for Android code protection. First, algorithms to insert irrelevant code and flatten the control flow are employed that minimize the cost of obfuscation while ensuring its strength. Second, we improve the traditional methods of control flow flattening to further reduce the costs of obfuscation. Lastly, the use of opaque predicates is strengthened by establishing an access control strategy, which converts the identification of opaque predicates in the entire program into a graph traversal problem, and thereby increases the strength of the code protection. We did some experiments to evaluate our method, and the results show that the proposed method can work well. |
doi_str_mv | 10.1109/CC.2017.8233664 |
format | Article |
fullrecord | <record><control><sourceid>wanfang_jour_RIE</sourceid><recordid>TN_cdi_chongqing_primary_674006303</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>674006303</cqvip_id><ieee_id>8233664</ieee_id><wanfj_id>zgtx201711019</wanfj_id><sourcerecordid>zgtx201711019</sourcerecordid><originalsourceid>FETCH-LOGICAL-c318t-628a78a41e04e460d54565f75cf56550af083ba89e77289660f94f8f28b2df543</originalsourceid><addsrcrecordid>eNpFkL1PwzAQxT2ARFU6M7BYSIxp7fgzY7EoVCoqA8yWm9htqmAXO1WBv56UFLjlpLvfe6d7AFxhNMYYFROlxjnCYixzQjinZ2CAuSAZo1RcgFFKW9SV5JzwfADmKvg2hgbOmnCAy5Xbp9K0dfDwziRbwecYWlv-DJ5suwkVdCHCqa9iqCs43e2auufTJTh3pkl2dOpD8Dq7f1GP2WL5MFfTRVYSLNuM59IIaSi2iFrKUcUo48wJVrquM2QckmRlZGGFyGXBOXIFddLlcpVXjlEyBLe978F4Z_xab8M--u6i_lq3H8fPuxRw0XGTnitjSClap3exfjPxU2Okj0FppfQR16egOsV1r6ittX_0__bm5LcJfv1ed5d_ES4oQpwgQr4BAHBvsg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Control Flow Obfuscation Based Protection Method for Android Applications</title><source>IEEE Electronic Library (IEL)</source><creator>Peng, Yong ; Su, Guanyu ; Tian, Bin ; Sun, Maohua ; Li, Qi</creator><creatorcontrib>Peng, Yong ; Su, Guanyu ; Tian, Bin ; Sun, Maohua ; Li, Qi</creatorcontrib><description>With the popularization and rapid development of mobile intelligent terminals(MITs), the number of mobile applications, or apps, has increased exponentially. It is increasingly common for malicious code to be inserted into counterfeit apps, which can cause significant economic damage and threaten the security of users. Code obfuscation techniques are a highly efficient group of methods for code security protection. In this paper, we propose a novel control flow obfuscation based method for Android code protection. First, algorithms to insert irrelevant code and flatten the control flow are employed that minimize the cost of obfuscation while ensuring its strength. Second, we improve the traditional methods of control flow flattening to further reduce the costs of obfuscation. Lastly, the use of opaque predicates is strengthened by establishing an access control strategy, which converts the identification of opaque predicates in the entire program into a graph traversal problem, and thereby increases the strength of the code protection. We did some experiments to evaluate our method, and the results show that the proposed method can work well.</description><identifier>ISSN: 1673-5447</identifier><identifier>DOI: 10.1109/CC.2017.8233664</identifier><identifier>CODEN: CCHOBE</identifier><language>eng</language><publisher>China Institute of Communications</publisher><subject>Access control ; Androids ; control flow obfuscation control flow obfuscation ; Humanoid robots ; Mobile communication ; Smart phones ; Software ; software security</subject><ispartof>China communications, 2017-11, Vol.14 (11), p.247-259</ispartof><rights>Copyright © Wanfang Data Co. Ltd. All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c318t-628a78a41e04e460d54565f75cf56550af083ba89e77289660f94f8f28b2df543</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/89450X/89450X.jpg</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8233664$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27923,27924,54757</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8233664$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Peng, Yong</creatorcontrib><creatorcontrib>Su, Guanyu</creatorcontrib><creatorcontrib>Tian, Bin</creatorcontrib><creatorcontrib>Sun, Maohua</creatorcontrib><creatorcontrib>Li, Qi</creatorcontrib><title>Control Flow Obfuscation Based Protection Method for Android Applications</title><title>China communications</title><addtitle>ChinaComm</addtitle><addtitle>China Communications</addtitle><description>With the popularization and rapid development of mobile intelligent terminals(MITs), the number of mobile applications, or apps, has increased exponentially. It is increasingly common for malicious code to be inserted into counterfeit apps, which can cause significant economic damage and threaten the security of users. Code obfuscation techniques are a highly efficient group of methods for code security protection. In this paper, we propose a novel control flow obfuscation based method for Android code protection. First, algorithms to insert irrelevant code and flatten the control flow are employed that minimize the cost of obfuscation while ensuring its strength. Second, we improve the traditional methods of control flow flattening to further reduce the costs of obfuscation. Lastly, the use of opaque predicates is strengthened by establishing an access control strategy, which converts the identification of opaque predicates in the entire program into a graph traversal problem, and thereby increases the strength of the code protection. We did some experiments to evaluate our method, and the results show that the proposed method can work well.</description><subject>Access control</subject><subject>Androids</subject><subject>control flow obfuscation control flow obfuscation</subject><subject>Humanoid robots</subject><subject>Mobile communication</subject><subject>Smart phones</subject><subject>Software</subject><subject>software security</subject><issn>1673-5447</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpFkL1PwzAQxT2ARFU6M7BYSIxp7fgzY7EoVCoqA8yWm9htqmAXO1WBv56UFLjlpLvfe6d7AFxhNMYYFROlxjnCYixzQjinZ2CAuSAZo1RcgFFKW9SV5JzwfADmKvg2hgbOmnCAy5Xbp9K0dfDwziRbwecYWlv-DJ5suwkVdCHCqa9iqCs43e2auufTJTh3pkl2dOpD8Dq7f1GP2WL5MFfTRVYSLNuM59IIaSi2iFrKUcUo48wJVrquM2QckmRlZGGFyGXBOXIFddLlcpVXjlEyBLe978F4Z_xab8M--u6i_lq3H8fPuxRw0XGTnitjSClap3exfjPxU2Okj0FppfQR16egOsV1r6ittX_0__bm5LcJfv1ed5d_ES4oQpwgQr4BAHBvsg</recordid><startdate>20171101</startdate><enddate>20171101</enddate><creator>Peng, Yong</creator><creator>Su, Guanyu</creator><creator>Tian, Bin</creator><creator>Sun, Maohua</creator><creator>Li, Qi</creator><general>China Institute of Communications</general><general>Beijing University of Posts and Telecommunications, No 10, Xitucheng Road, Haidian District, Beijing, 100876, China</general><general>Beijing KeyLaboratory of Space-ground Interconnection and Convergence, No 10, Xitucheng Road, Haidian District, Beijing, 100876, China%China Information Technology Security Evaluation Center, No 1 Building, No 8 Shangdixi Road, Haidian District, Beijing, 100085, China%Information School, Capital University of Economics and Business, No 121 Zhangjia Road, Fengtai District, Beijing, 100070, China</general><general>Beijing KeyLaboratory of Space-ground Interconnection and Convergence, No 10, Xitucheng Road, Haidian District, Beijing, 100876, China</general><general>China Information Technology Security Evaluation Center, No 1 Building, No 8 Shangdixi Road, Haidian District, Beijing, 100085, China%Beijing University of Posts and Telecommunications, No 10, Xitucheng Road, Haidian District, Beijing, 100876, China</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>2B.</scope><scope>4A8</scope><scope>92I</scope><scope>93N</scope><scope>PSX</scope><scope>TCJ</scope></search><sort><creationdate>20171101</creationdate><title>Control Flow Obfuscation Based Protection Method for Android Applications</title><author>Peng, Yong ; Su, Guanyu ; Tian, Bin ; Sun, Maohua ; Li, Qi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c318t-628a78a41e04e460d54565f75cf56550af083ba89e77289660f94f8f28b2df543</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Access control</topic><topic>Androids</topic><topic>control flow obfuscation control flow obfuscation</topic><topic>Humanoid robots</topic><topic>Mobile communication</topic><topic>Smart phones</topic><topic>Software</topic><topic>software security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Peng, Yong</creatorcontrib><creatorcontrib>Su, Guanyu</creatorcontrib><creatorcontrib>Tian, Bin</creatorcontrib><creatorcontrib>Sun, Maohua</creatorcontrib><creatorcontrib>Li, Qi</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Wanfang Data Journals - Hong Kong</collection><collection>WANFANG Data Centre</collection><collection>Wanfang Data Journals</collection><collection>万方数据期刊 - 香港版</collection><collection>China Online Journals (COJ)</collection><collection>China Online Journals (COJ)</collection><jtitle>China communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Peng, Yong</au><au>Su, Guanyu</au><au>Tian, Bin</au><au>Sun, Maohua</au><au>Li, Qi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Control Flow Obfuscation Based Protection Method for Android Applications</atitle><jtitle>China communications</jtitle><stitle>ChinaComm</stitle><addtitle>China Communications</addtitle><date>2017-11-01</date><risdate>2017</risdate><volume>14</volume><issue>11</issue><spage>247</spage><epage>259</epage><pages>247-259</pages><issn>1673-5447</issn><coden>CCHOBE</coden><abstract>With the popularization and rapid development of mobile intelligent terminals(MITs), the number of mobile applications, or apps, has increased exponentially. It is increasingly common for malicious code to be inserted into counterfeit apps, which can cause significant economic damage and threaten the security of users. Code obfuscation techniques are a highly efficient group of methods for code security protection. In this paper, we propose a novel control flow obfuscation based method for Android code protection. First, algorithms to insert irrelevant code and flatten the control flow are employed that minimize the cost of obfuscation while ensuring its strength. Second, we improve the traditional methods of control flow flattening to further reduce the costs of obfuscation. Lastly, the use of opaque predicates is strengthened by establishing an access control strategy, which converts the identification of opaque predicates in the entire program into a graph traversal problem, and thereby increases the strength of the code protection. We did some experiments to evaluate our method, and the results show that the proposed method can work well.</abstract><pub>China Institute of Communications</pub><doi>10.1109/CC.2017.8233664</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1673-5447 |
ispartof | China communications, 2017-11, Vol.14 (11), p.247-259 |
issn | 1673-5447 |
language | eng |
recordid | cdi_chongqing_primary_674006303 |
source | IEEE Electronic Library (IEL) |
subjects | Access control Androids control flow obfuscation control flow obfuscation Humanoid robots Mobile communication Smart phones Software software security |
title | Control Flow Obfuscation Based Protection Method for Android Applications |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T07%3A49%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-wanfang_jour_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Control%20Flow%20Obfuscation%20Based%20Protection%20Method%20for%20Android%20Applications&rft.jtitle=China%20communications&rft.au=Peng,%20Yong&rft.date=2017-11-01&rft.volume=14&rft.issue=11&rft.spage=247&rft.epage=259&rft.pages=247-259&rft.issn=1673-5447&rft.coden=CCHOBE&rft_id=info:doi/10.1109/CC.2017.8233664&rft_dat=%3Cwanfang_jour_RIE%3Ezgtx201711019%3C/wanfang_jour_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_cqvip_id=674006303&rft_ieee_id=8233664&rft_wanfj_id=zgtx201711019&rfr_iscdi=true |