Structural and Functional Analyses of ProGuard Obfuscation Tool 


Vol. 38,  No. 8, pp. 654-662, Aug.  2013


PDF
  Abstract

Android applications can be easily decompiled owing to their structural characteristics, in which applications are developed using Java and are self-signed so that applications modified in this way can be repackaged. It will be crucial that this inherent vulnerability may be used to an increasing number of Android-based financial service applications, including banking applications. Thus, code obfuscation techniques are used as one of solutions to protect applications against their forgery. Currently, many of applications distributed on Android market are using ProGuard as an obfuscation tool. However, ProGuard takes care of only the renaming obfuscation, and using this method, the original opcodes remain unchanged. In this paper, we thoroughly analyze obfuscation mechanisms applied in ProGuard, investigate its limitations, and give some direction about its improvement.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Piao, J. Jung, J. H. Yi, "Structural and Functional Analyses of ProGuard Obfuscation Tool," The Journal of Korean Institute of Communications and Information Sciences, vol. 38, no. 8, pp. 654-662, 2013. DOI: .

[ACM Style]

Yuxue Piao, Jin-hyuk Jung, and Jeong Hyun Yi. 2013. Structural and Functional Analyses of ProGuard Obfuscation Tool. The Journal of Korean Institute of Communications and Information Sciences, 38, 8, (2013), 654-662. DOI: .

[KICS Style]

Yuxue Piao, Jin-hyuk Jung, Jeong Hyun Yi, "Structural and Functional Analyses of ProGuard Obfuscation Tool," The Journal of Korean Institute of Communications and Information Sciences, vol. 38, no. 8, pp. 654-662, 8. 2013.