Browse > Article
http://dx.doi.org/10.7840/kics.2013.38B.8.654

Structural and Functional Analyses of ProGuard Obfuscation Tool  

Piao, Yuxue (숭실대학교 대학원 컴퓨터학과)
Jung, Jin-Hyuk (숭실대학교 대학원 컴퓨터학과)
Yi, Jeong Hyun (숭실대학교 컴퓨터학부)
Abstract
Android applications can be easily decompiled owing to their structural characteristics, in which applications are developed using Java and are self-signed so that applications modified in this way can be repackaged. It will be crucial that this inherent vulnerability may be used to an increasing number of Android-based financial service applications, including banking applications. Thus, code obfuscation techniques are used as one of solutions to protect applications against their forgery. Currently, many of applications distributed on Android market are using ProGuard as an obfuscation tool. However, ProGuard takes care of only the renaming obfuscation, and using this method, the original opcodes remain unchanged. In this paper, we thoroughly analyze obfuscation mechanisms applied in ProGuard, investigate its limitations, and give some direction about its improvement.
Keywords
Obfuscation; ProGuard; Android Security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Allatori, Java obfuscator, Retrieved May., 2013, from http://www.allatori.com.
2 Saikoa, DexGuard, Retrieved May., 2013, from http://www.saikoa.com/.
3 Wikipedia, Visitor Pattern, Retrieved May., 2013, from http://en.wikipedia.org/wiki/Visitor_pattern.
4 Java Decompiler, Retrieved May., 2013, from http://java.decompiler.free.fr/.
5 J. H. Jung, J. Y. Kim, H. C. Lee, and J. H. Yi, "Repackaging attack on android banking applications and its countermeasures," J. Wireless Personal Communications(WPC)., [Online], Available: http://link.springer.com/content/pdf/10.1007%2 Fs11277-013-1258-x.pdf, June. 2013.
6 G. I. Ma, H. C. Lee, and J. H. Yi, "A secure short-range wireless connectivity scheme for mobile wallet services," J. KIISE : Inform. Networking, vol. 38, no. 5, pp. 394-404, Oct. 2011.   과학기술학회마을
7 C. Collberg, C. Thomborson, and D. Low, "A taxonomy of obfuscating transformations," Technical Report No. 148, Univ. Auckland, New Zealand, 1997.
8 Eric Lafortune, ProGuard, Retrieved May., 2013, from http://proguard.sourceforge.net/.
9 T. Lindholm, F. Yellin, G. Bracha, and A. Buckley, "The Java virtual machine specification: Java SE 7 Edition," Oracle America, Feb. 2013.
10 PreEmptive Solutions, DashOPro, Retrieved May., 2013, from http://www.preemptive.com.