{"id":"https://openalex.org/W4288057631","doi":"https://doi.org/10.1109/eit53891.2022.9837111","title":"FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps","display_name":"FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps","publication_year":2022,"publication_date":"2022-05-19","ids":{"openalex":"https://openalex.org/W4288057631","doi":"https://doi.org/10.1109/eit53891.2022.9837111"},"language":"en","primary_location":{"id":"doi:10.1109/eit53891.2022.9837111","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit53891.2022.9837111","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103053840","display_name":"Balakrishnan Dharmalingam","orcid":"https://orcid.org/0000-0002-6180-0488"},"institutions":[{"id":"https://openalex.org/I177721651","display_name":"Oakland University","ror":"https://ror.org/01ythxj32","country_code":"US","type":"education","lineage":["https://openalex.org/I177721651"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Balakrishnan Dharmalingam","raw_affiliation_strings":["Oakland University,Department of Computer Science and Engineering,Rochester,Michigan,USA","Department of Computer Science and Engineering, Oakland University, Rochester, Michigan, USA"],"affiliations":[{"raw_affiliation_string":"Oakland University,Department of Computer Science and Engineering,Rochester,Michigan,USA","institution_ids":["https://openalex.org/I177721651"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Oakland University, Rochester, Michigan, USA","institution_ids":["https://openalex.org/I177721651"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102983664","display_name":"Anyi Liu","orcid":"https://orcid.org/0000-0002-6011-1998"},"institutions":[{"id":"https://openalex.org/I177721651","display_name":"Oakland University","ror":"https://ror.org/01ythxj32","country_code":"US","type":"education","lineage":["https://openalex.org/I177721651"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anyi Liu","raw_affiliation_strings":["Oakland University,Department of Computer Science and Engineering,Rochester,Michigan,USA","Department of Computer Science and Engineering, Oakland University, Rochester, Michigan, USA"],"affiliations":[{"raw_affiliation_string":"Oakland University,Department of Computer Science and Engineering,Rochester,Michigan,USA","institution_ids":["https://openalex.org/I177721651"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Oakland University, Rochester, Michigan, USA","institution_ids":["https://openalex.org/I177721651"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005537270","display_name":"Subramaniam Ganesan","orcid":"https://orcid.org/0000-0003-0233-9940"},"institutions":[{"id":"https://openalex.org/I177721651","display_name":"Oakland University","ror":"https://ror.org/01ythxj32","country_code":"US","type":"education","lineage":["https://openalex.org/I177721651"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Subra Ganesan","raw_affiliation_strings":["Oakland University,Department of Electrical and Computer Engineering,Rochester,Michigan,USA","Department of Electrical and Computer Engineering, Oakland University, Rochester, Michigan, USA"],"affiliations":[{"raw_affiliation_string":"Oakland University,Department of Electrical and Computer Engineering,Rochester,Michigan,USA","institution_ids":["https://openalex.org/I177721651"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Oakland University, Rochester, Michigan, USA","institution_ids":["https://openalex.org/I177721651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103390066","display_name":"Sankardas Roy","orcid":null},"institutions":[{"id":"https://openalex.org/I157417397","display_name":"Bowling Green State University","ror":"https://ror.org/00ay7va13","country_code":"US","type":"education","lineage":["https://openalex.org/I157417397"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sankardas Roy","raw_affiliation_strings":["Bowling Green State University,Department of Computer Science,Bowling Green,Ohio,USA","Department of Computer Science, Bowling Green State University, Bowling Green, Ohio, USA"],"affiliations":[{"raw_affiliation_string":"Bowling Green State University,Department of Computer Science,Bowling Green,Ohio,USA","institution_ids":["https://openalex.org/I157417397"]},{"raw_affiliation_string":"Department of Computer Science, Bowling Green State University, Bowling Green, Ohio, USA","institution_ids":["https://openalex.org/I157417397"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103053840"],"corresponding_institution_ids":["https://openalex.org/I177721651"],"apc_list":null,"apc_paid":null,"fwci":0.1486,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.38606101,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"368","last_page":"374"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9165380001068115},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.8422959446907043},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7983605861663818},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7256277203559875},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6095119118690491},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5526594519615173},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.49025753140449524},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.48205551505088806},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47171467542648315},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4351217448711395},{"id":"https://openalex.org/keywords/call-graph","display_name":"Call graph","score":0.42199188470840454},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.34295374155044556},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.15907076001167297}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9165380001068115},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.8422959446907043},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7983605861663818},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7256277203559875},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6095119118690491},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5526594519615173},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.49025753140449524},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.48205551505088806},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47171467542648315},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4351217448711395},{"id":"https://openalex.org/C102379954","wikidata":"https://www.wikidata.org/wiki/Q2589940","display_name":"Call graph","level":2,"score":0.42199188470840454},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.34295374155044556},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.15907076001167297},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eit53891.2022.9837111","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit53891.2022.9837111","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2100209048","https://openalex.org/W2120952569","https://openalex.org/W2127723417","https://openalex.org/W2178906754","https://openalex.org/W2591902139","https://openalex.org/W2756202828","https://openalex.org/W2761145057","https://openalex.org/W2762536380","https://openalex.org/W2767061221","https://openalex.org/W2962830343","https://openalex.org/W2962909855","https://openalex.org/W3002912819","https://openalex.org/W3008670474","https://openalex.org/W3023495226","https://openalex.org/W3134215180","https://openalex.org/W3168284794","https://openalex.org/W3204960723","https://openalex.org/W4244726870","https://openalex.org/W6734189680","https://openalex.org/W6744628271","https://openalex.org/W6790868287"],"related_works":["https://openalex.org/W2913519194","https://openalex.org/W2007287520","https://openalex.org/W2132360941","https://openalex.org/W4362634109","https://openalex.org/W2055981842","https://openalex.org/W4388820743","https://openalex.org/W2793135307","https://openalex.org/W2532550198","https://openalex.org/W3134235726","https://openalex.org/W2906395579"],"abstract_inverted_index":{"Software":[0],"reverse":[1,45],"engineering":[2,46],"has":[3],"been":[4],"applied":[5],"widely":[6],"by":[7],"analyzing":[8],"software":[9,79,105,117,171],"for":[10,26],"identifying":[11],"vulnerabilities":[12],"and":[13,36,52,66,107,125,190],"hidden":[14],"functionalities,":[15],"primarily":[16],"without":[17],"the":[18,24,54,77,82,116,132,139,143,151,181],"source":[19],"code.":[20],"It":[21],"also":[22],"opens":[23],"door":[25],"malicious":[27],"analyzers":[28],"to":[29,153,173],"learn":[30],"intellectual":[31],"properties,":[32],"steal":[33],"confidential":[34],"algorithms,":[35],"potentially":[37],"launch":[38],"exploits":[39],"against":[40,185],"software,":[41],"commonly":[42],"known":[43],"as":[44,64],"attacks":[47],"(REAs).":[48],"To":[49],"thwart":[50],"capabilities":[51],"mitigate":[53],"effects":[55],"of":[56,84,101,120,145,166,183],"possible":[57],"REAs,":[58],"various":[59],"obfuscation":[60,152,167,177,202],"technologies":[61,74],"were":[62],"introduced":[63],"countermeasures":[65],"have":[67],"proven":[68],"their":[69],"effectiveness.":[70],"However,":[71],"most":[72],"existing":[73,201],"either":[75],"obfuscate":[76],"whole":[78],"piece":[80],"or":[81],"code":[83,133],"interest.":[85],"In":[86],"this":[87],"paper,":[88],"we":[89],"present":[90],"FineObfuscator,":[91],"a":[92,97,104,157,164,175],"context-sensitive":[93],"system":[94],"that":[95],"obfuscates":[96,138],"significantly":[98,195],"limited":[99],"number":[100],"components":[102,141],"in":[103,118,135],"package":[106],"still":[108],"effectively":[109],"thwarts":[110],"REAs.":[111,147],"Specificaly,":[112],"FineObfuscator":[113,162,184],"statically":[114],"analyzes":[115],"terms":[119],"Control":[121],"Flow":[122],"Graph":[123],"(CFG)":[124],"inter-procedural":[126],"control":[127],"flow":[128],"graphs":[129],"(ICFGs),":[130],"identifies":[131],"snippet":[134],"critical":[136,140],"components,":[137],"with":[142,194,200],"goal":[144],"defeating":[146],"This":[148],"scheme":[149],"allows":[150],"be":[154],"performed":[155],"at":[156],"more":[158],"fine-grained":[159],"level.":[160],"Furthermore,":[161],"accepts":[163],"collection":[165],"policies,":[168],"which":[169],"allow":[170],"developers":[172],"construct":[174],"customized":[176],"strategy.":[178],"We":[179],"evaluate":[180],"effectiveness":[182],"some":[186],"well-referred":[187],"Android":[188],"repositories":[189],"generate":[191],"promising":[192],"results":[193],"fewer":[196],"computing":[197],"resources,":[198],"compared":[199],"tools.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
