• Login
    View Item 
    •   Home
    • University of Alaska Fairbanks
    • UAF Graduate School
    • Computer Science
    • View Item
    •   Home
    • University of Alaska Fairbanks
    • UAF Graduate School
    • Computer Science
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of Scholarworks@UACommunitiesPublication DateAuthorsTitlesSubjectsTypeThis CollectionPublication DateAuthorsTitlesSubjectsType

    My Account

    Login

    First Time Submitters, Register Here

    Register

    Statistics

    Display statistics

    Obfuscation fingerprinting in Android binaries

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    Name:
    VanVeldhuizen_M_2015.pdf
    Size:
    10.25Mb
    Format:
    PDF
    Download
    Author
    Van Veldhuizen, Matthew Philip
    Keyword
    Mobile computing
    Security measures
    Operating systems (Computers)
    Computer security
    Metadata
    Show full item record
    URI
    http://hdl.handle.net/11122/8865
    Abstract
    There are many way to protect code from reverse engineering. One such way is to obfuscate either the source code, machine code or bytecode. Obfuscating Android applications not only makes it harder to reverse engineer, it can also speed up execution by reducing the size of the application and removing unnecessary code. One method of obfuscation is to do it manually and the other method is to use an obfuscation program. However, it may become necessary to reverse obfuscation, because of the loss of source code or when investigating malware, trojans, or other harmful applications. This process is called deobfuscation. Once an application has been obfuscated performing deobfuscation is a tedious task, and knowing how the application was obfuscated would increase the probability of correctly reversing the obfuscation. By examining four Android application obfuscators I successfully identified distinct fingerprints within each of the obfuscated binaries by building a simple Android application, obfuscating it, and then comparing obfuscated and unobfuscated bytecode. Using these fingerprints I was able to associate each obfuscator with an approximate probability that it was used to perform the obfuscation.
    Description
    Master's Project (M.S.) University of Alaska Fairbanks, 2015
    Date
    2015-04
    Type
    Master's Project
    Collections
    Computer Science

    entitlement

     
    ABOUT US|HELP|BROWSE|ADVANCED SEARCH

    The University of Alaska Fairbanks is an affirmative action/equal opportunity employer and educational institution and is a part of the University of Alaska system.

    ©UAF 2013 - 2023 | Questions? ua-scholarworks@alaska.edu | Last modified: September 25, 2019

    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.