{"id":"https://openalex.org/W3214503314","doi":"https://doi.org/10.1145/3426020.3426089","title":"Reversing Obfuscated Control Flow Structures in Android Apps using ReDex Optimizer","display_name":"Reversing Obfuscated Control Flow Structures in Android Apps using ReDex Optimizer","publication_year":2020,"publication_date":"2020-09-17","ids":{"openalex":"https://openalex.org/W3214503314","doi":"https://doi.org/10.1145/3426020.3426089","mag":"3214503314"},"language":"en","primary_location":{"id":"doi:10.1145/3426020.3426089","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3426020.3426089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 9th International Conference on Smart Media and Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075277010","display_name":"Geunha You","orcid":"https://orcid.org/0000-0001-8628-9092"},"institutions":[{"id":"https://openalex.org/I89015989","display_name":"Dankook University","ror":"https://ror.org/058pdbn81","country_code":"KR","type":"education","lineage":["https://openalex.org/I89015989"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Geunha You","raw_affiliation_strings":["Dankook University, S. Korea"],"affiliations":[{"raw_affiliation_string":"Dankook University, S. Korea","institution_ids":["https://openalex.org/I89015989"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031471844","display_name":"Gyoosik Kim","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gyoosik Kim","raw_affiliation_strings":["KT Institute, S. Korea"],"affiliations":[{"raw_affiliation_string":"KT Institute, S. Korea","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013626829","display_name":"Jihyeon Park","orcid":"https://orcid.org/0000-0001-7456-9038"},"institutions":[{"id":"https://openalex.org/I89015989","display_name":"Dankook University","ror":"https://ror.org/058pdbn81","country_code":"KR","type":"education","lineage":["https://openalex.org/I89015989"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jihyeon Park","raw_affiliation_strings":["Dankook University, S. Korea"],"affiliations":[{"raw_affiliation_string":"Dankook University, S. Korea","institution_ids":["https://openalex.org/I89015989"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064210973","display_name":"Seong-je Cho","orcid":"https://orcid.org/0000-0001-9917-0429"},"institutions":[{"id":"https://openalex.org/I89015989","display_name":"Dankook University","ror":"https://ror.org/058pdbn81","country_code":"KR","type":"education","lineage":["https://openalex.org/I89015989"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seong-Je Cho","raw_affiliation_strings":["Dankook University, S. Korea"],"affiliations":[{"raw_affiliation_string":"Dankook University, S. Korea","institution_ids":["https://openalex.org/I89015989"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101428286","display_name":"Minkyu Park","orcid":"https://orcid.org/0000-0002-6148-8244"},"institutions":[{"id":"https://openalex.org/I4210091929","display_name":"Konkuk University Medical Center","ror":"https://ror.org/00jcx1769","country_code":"KR","type":"healthcare","lineage":["https://openalex.org/I24062138","https://openalex.org/I4210091929"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Minkyu Park","raw_affiliation_strings":["Konkuk University, S. Korea"],"affiliations":[{"raw_affiliation_string":"Konkuk University, S. Korea","institution_ids":["https://openalex.org/I4210091929"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5075277010"],"corresponding_institution_ids":["https://openalex.org/I89015989"],"apc_list":null,"apc_paid":null,"fwci":0.3031,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.5801185,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"272","last_page":"276"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9587479829788208},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8268778324127197},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.7408362627029419},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.7363374829292297},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7265520095825195},{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.7142340540885925},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6869833469390869},{"id":"https://openalex.org/keywords/reversing","display_name":"Reversing","score":0.6785412430763245},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.48448750376701355},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4262852072715759},{"id":"https://openalex.org/keywords/data-flow-analysis","display_name":"Data-flow analysis","score":0.4206421375274658},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4071490168571472},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2837740480899811},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.2695986032485962},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.17497125267982483},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.13386434316635132}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9587479829788208},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8268778324127197},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.7408362627029419},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.7363374829292297},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7265520095825195},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.7142340540885925},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6869833469390869},{"id":"https://openalex.org/C2781085045","wikidata":"https://www.wikidata.org/wiki/Q7318308","display_name":"Reversing","level":2,"score":0.6785412430763245},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.48448750376701355},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4262852072715759},{"id":"https://openalex.org/C88468194","wikidata":"https://www.wikidata.org/wiki/Q1172416","display_name":"Data-flow analysis","level":3,"score":0.4206421375274658},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4071490168571472},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2837740480899811},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.2695986032485962},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.17497125267982483},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.13386434316635132},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3426020.3426089","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3426020.3426089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 9th International Conference on Smart Media and Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2401561631","https://openalex.org/W2533383364","https://openalex.org/W2767061221","https://openalex.org/W2954055058","https://openalex.org/W2962830343","https://openalex.org/W3002912819"],"related_works":["https://openalex.org/W4321062042","https://openalex.org/W1588238984","https://openalex.org/W2160018797","https://openalex.org/W2961710371","https://openalex.org/W2241366172","https://openalex.org/W2306533882","https://openalex.org/W3194285038","https://openalex.org/W2919866608","https://openalex.org/W4200123977","https://openalex.org/W2011536294"],"abstract_inverted_index":{"Code":[0],"obfuscation":[1,15,47,70,99,118],"is":[2],"a":[3,141],"technique":[4,16],"that":[5,107],"makes":[6],"programs":[7],"harder":[8],"to":[9,17,24,42,95,148],"understand.":[10],"Malware":[11],"writers":[12],"widely":[13],"the":[14,36,43,53,68,73,83,97,124,131],"evade":[18],"detection":[19],"from":[20],"anti-malware":[21],"software,":[22],"or":[23],"deter":[25],"reverse":[26,96],"engineering":[27],"attempts":[28],"for":[29,66],"their":[30],"malicious":[31],"code.":[32],"If":[33],"we":[34,50,62],"de-obfuscate":[35],"obfuscated":[37,54,115],"code":[38,45],"and":[39,57,85,135,153],"restore":[40],"it":[41,139],"original":[44],"before":[46],"was":[48],"applied,":[49],"can":[51,109],"analyze":[52,82],"malware":[55],"effectively":[56],"efficiently.":[58],"In":[59],"this":[60],"paper,":[61],"apply":[63],"ReDex":[64,88,108,129],"optimizer":[65],"reversing":[67],"control-flow":[69,98],"performed":[71],"by":[72],"Obfuscapk":[74,121],"system":[75],"on":[76],"open-source":[77],"Android":[78,101],"applications.":[79],"We":[80],"then":[81],"effectiveness":[84],"limitations":[86],"of":[87,91,100,112,120,126,133],"in":[89,143],"terms":[90],"its":[92],"deobfuscation":[93],"ability":[94],"apps.":[102],"The":[103],"experimental":[104],"results":[105],"show":[106],"recover":[110],"1089":[111],"1108":[113],"apps":[114],"with":[116],"control-flows":[117],"techniques":[119],"obfuscator.":[122],"During":[123],"process":[125],"optimizing":[127],"bytecode,":[128],"reduces":[130],"number":[132],"methods":[134],"fields":[136],"significantly":[137],"while":[138],"has":[140],"limitation":[142],"removing":[144],"dead":[145],"codes":[146],"related":[147],"both":[149],"useless":[150],"goto":[151],"statements":[152],"random":[154],"nop":[155],"instructions.":[156]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
