Anti-ProGuard: Towards Automated Deobfuscation of Android Apps

SHCIS '17 Pub Date : 2017-06-19 DOI:10.1145/3099012.3099020
Richard Baumann, Mykola Protsenko, Tilo Müller
{"title":"Anti-ProGuard: Towards Automated Deobfuscation of Android Apps","authors":"Richard Baumann, Mykola Protsenko, Tilo Müller","doi":"10.1145/3099012.3099020","DOIUrl":null,"url":null,"abstract":"A wide adoption of obfuscation techniques by Android application developers, and especially malware authors, introduces a high degree of complication into the process of reverse engineering, analysis, and security evaluation of third-party and potentially harmful apps.\n In this paper we present the early results of our research aiming to provide reliable means for automated deobfuscation of Android apps. According to the underlying approach, deobfuscation of a given app is performed by matching its code parts to the unobfuscated code stored in a database. For this purpose we apply well-known software similarity algorithms, such as SimHash and n-gram based ones. As a source of unobfuscated code can serve open source apps and libraries, as well as previously analyzed and manually deobfuscated code.\n Although the presented techniques are generic in their nature, our current prototype mainly targets Proguard, as one of the most widely used protection tools for Android performing primarily renaming obfuscation. The evaluation of the presented Anti-ProGuard tool witnesses its effectiveness for the considered task and supports the feasibility of the proposed approach.","PeriodicalId":269698,"journal":{"name":"SHCIS '17","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"22","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"SHCIS '17","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3099012.3099020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 22

Abstract

A wide adoption of obfuscation techniques by Android application developers, and especially malware authors, introduces a high degree of complication into the process of reverse engineering, analysis, and security evaluation of third-party and potentially harmful apps. In this paper we present the early results of our research aiming to provide reliable means for automated deobfuscation of Android apps. According to the underlying approach, deobfuscation of a given app is performed by matching its code parts to the unobfuscated code stored in a database. For this purpose we apply well-known software similarity algorithms, such as SimHash and n-gram based ones. As a source of unobfuscated code can serve open source apps and libraries, as well as previously analyzed and manually deobfuscated code. Although the presented techniques are generic in their nature, our current prototype mainly targets Proguard, as one of the most widely used protection tools for Android performing primarily renaming obfuscation. The evaluation of the presented Anti-ProGuard tool witnesses its effectiveness for the considered task and supports the feasibility of the proposed approach.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Anti-ProGuard:实现Android应用程序的自动解混淆
Android应用程序开发人员,特别是恶意软件作者广泛采用混淆技术,这给第三方和潜在有害应用程序的逆向工程、分析和安全评估过程带来了高度的复杂性。在本文中,我们展示了我们的研究的早期结果,旨在为Android应用程序的自动解混淆提供可靠的方法。根据底层方法,通过将其代码部分与存储在数据库中的未混淆代码进行匹配来执行给定应用程序的去混淆。为此,我们应用了众所周知的软件相似性算法,如SimHash和基于n-gram的算法。作为未混淆代码的来源,可以服务于开源应用程序和库,以及以前分析和手动去混淆的代码。虽然所呈现的技术在本质上是通用的,但我们目前的原型主要针对Proguard,作为Android执行主要重命名混淆的最广泛使用的保护工具之一。对Anti-ProGuard工具的评估证明了其对所考虑任务的有效性,并支持了所提出方法的可行性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Towards a Generic Architecture for Interactive Cost-Aware Visualization of Monitoring Data in Distributed Systems Protecting JavaScript Apps from Code Analysis Virtual Machine Introspection Based SSH Honeypot Towards a Multi-objective Optimization Model to Support Information Security Investment Decision-making Architecture for Resource-Aware VMI-based Cloud Malware Analysis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1