{"id":"https://openalex.org/W2919866608","doi":"https://doi.org/10.1109/tencon.2018.8650141","title":"Progressive Control Flow Obfuscation for Android Applications","display_name":"Progressive Control Flow Obfuscation for Android Applications","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2919866608","doi":"https://doi.org/10.1109/tencon.2018.8650141","mag":"2919866608"},"language":"en","primary_location":{"id":"doi:10.1109/tencon.2018.8650141","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2018.8650141","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2018 - 2018 IEEE Region 10 Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100425779","display_name":"Li Zhang","orcid":"https://orcid.org/0000-0003-4837-0900"},"institutions":[{"id":"https://openalex.org/I115228651","display_name":"Agency for Science, Technology and Research","ror":"https://ror.org/036wvzt09","country_code":"SG","type":"government","lineage":["https://openalex.org/I115228651"]},{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Li Zhang","raw_affiliation_strings":["Institute for Infocomm Research, A*STAR, Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research, A*STAR, Singapore","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I115228651"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085641844","display_name":"Mark Huasong Meng","orcid":"https://orcid.org/0000-0003-1039-2151"},"institutions":[{"id":"https://openalex.org/I115228651","display_name":"Agency for Science, Technology and Research","ror":"https://ror.org/036wvzt09","country_code":"SG","type":"government","lineage":["https://openalex.org/I115228651"]},{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Huasong Meng","raw_affiliation_strings":["Institute for Infocomm Research, A*STAR, Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research, A*STAR, Singapore","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I115228651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040321131","display_name":"Vrizlynn L. L. Thing","orcid":"https://orcid.org/0000-0003-4424-8596"},"institutions":[{"id":"https://openalex.org/I115228651","display_name":"Agency for Science, Technology and Research","ror":"https://ror.org/036wvzt09","country_code":"SG","type":"government","lineage":["https://openalex.org/I115228651"]},{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Vrizlynn L. L. Thing","raw_affiliation_strings":["Institute for Infocomm Research, A*STAR, Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research, A*STAR, Singapore","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I115228651"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100425779"],"corresponding_institution_ids":["https://openalex.org/I115228651","https://openalex.org/I3005327000"],"apc_list":null,"apc_paid":null,"fwci":0.4954,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.66352848,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"500","issue":null,"first_page":"1075","last_page":"1079"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9098888635635376},{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.908359169960022},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.8253835439682007},{"id":"https://openalex.org/keywords/cyclomatic-complexity","display_name":"Cyclomatic complexity","score":0.8178253769874573},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8088957667350769},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7269129753112793},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5530607104301453},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.42386019229888916},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3763697147369385},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.30194786190986633},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23443403840065002},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23241999745368958},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.21394407749176025},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.14582377672195435}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9098888635635376},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.908359169960022},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.8253835439682007},{"id":"https://openalex.org/C187303228","wikidata":"https://www.wikidata.org/wiki/Q867330","display_name":"Cyclomatic complexity","level":3,"score":0.8178253769874573},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8088957667350769},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7269129753112793},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5530607104301453},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.42386019229888916},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3763697147369385},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.30194786190986633},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23443403840065002},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23241999745368958},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.21394407749176025},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.14582377672195435}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tencon.2018.8650141","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2018.8650141","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2018 - 2018 IEEE Region 10 Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1535984709","https://openalex.org/W1543331277","https://openalex.org/W1547894260","https://openalex.org/W1551162551","https://openalex.org/W1567046609","https://openalex.org/W1569422795","https://openalex.org/W2080696000","https://openalex.org/W2089735638","https://openalex.org/W2093610458","https://openalex.org/W2126851641","https://openalex.org/W2401561631","https://openalex.org/W6632122400","https://openalex.org/W6632523919","https://openalex.org/W6632907626","https://openalex.org/W6634033044"],"related_works":["https://openalex.org/W4321062042","https://openalex.org/W1588238984","https://openalex.org/W2160018797","https://openalex.org/W2961710371","https://openalex.org/W2241366172","https://openalex.org/W2306533882","https://openalex.org/W4200123977","https://openalex.org/W2919866608","https://openalex.org/W2614046679","https://openalex.org/W4390754876"],"abstract_inverted_index":{"Android":[0,14],"bytecode":[1],"is":[2,178,189],"easy":[3],"to":[4,17,28,33,70,83,105],"reverse":[5],"engineer.":[6],"It":[7],"has":[8,102],"been":[9],"a":[10,66,93,126,181],"common":[11],"practice":[12],"for":[13],"application":[15,37,47,80,100,119,219],"developers":[16],"protect":[18],"their":[19],"applications":[20],"with":[21],"obfuscation":[22,26,63,96,177],"techniques.":[23],"Control":[24],"flow":[25,62],"aims":[27],"make":[29],"it":[30,85],"more":[31,103,143],"difficult":[32],"determine":[34],"the":[35,43,46,50,54,71,79,99,107,110,152,169,176,185,211,215],"actual":[36],"control":[38,61],"flows":[39],"and":[40,73,113,130,136,166],"thereby":[41],"impede":[42],"understanding":[44],"of":[45,53,118,128,202,218],"logic":[48],"by":[49,124,141],"attacker.":[51],"Despite":[52],"strong":[55],"potency":[56],"(i.e.,":[57],"high":[58],"complexity":[59,112,153,163,171,187,208],"increment),":[60],"usually":[64],"incurs":[65,198],"large":[67],"overhead":[68,201],"due":[69],"call":[72],"return":[74],"instructions":[75],"inserted,":[76],"which":[77],"makes":[78],"developer":[81,101],"reluctant":[82],"use":[84],"in":[86,133,146,180],"practice.":[87],"In":[88,173],"this":[89],"paper,":[90],"we":[91],"present":[92],"pragmatic":[94],"control-flow":[95],"approach":[97],"where":[98],"freedom":[104],"customize":[106],"trade-off":[108],"between":[109],"achieved":[111],"overhead.":[114],"A":[115],"new":[116],"subset":[117],"methods":[120,138,220],"will":[121,155],"be":[122,156],"obfuscated":[123,140],"using":[125,159],"combination":[127],"packed-switch":[129],"try-catch":[131],"constructs":[132],"different":[134],"rounds,":[135],"larger":[137],"are":[139,221],"creating":[142],"code":[144],"fragments":[145],"earlier":[147],"rounds.":[148],"After":[149],"each":[150],"round,":[151],"increment":[154,188,209],"automatically":[157],"calculated":[158],"our":[160,196],"implemented":[161],"cyclomatic":[162],"based":[164],"metric":[165],"checked":[167],"against":[168],"target":[170,186],"increment.":[172],"other":[174],"words,":[175],"conducted":[179],"progressive":[182],"manner":[183],"until":[184],"reached.":[190],"The":[191],"experimental":[192],"results":[193],"show":[194],"that":[195],"method":[197,213],"averaged":[199],"area":[200],"4.07%":[203],"while":[204],"achieving":[205],"almost":[206],"double":[207],"than":[210],"existing":[212],"when":[214],"same":[216],"number":[217],"obfuscated.":[222]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
