TY - JOUR
T1 - Android application forensics
T2 - A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations
AU - Zhang, Xiaolu
AU - Breitinger, Frank
AU - Luechinger, Engelbert
AU - O'Shaughnessy, Stephen
N1 - Publisher Copyright:
© 2021 The Authors
PY - 2021/12
Y1 - 2021/12
N2 - Android obfuscation techniques include not only classic code obfuscation techniques that were adapted to Android, but also obfuscation methods that target the Android platform specifically. This work examines the status-quo of Android obfuscation, obfuscation detection and deobfuscation. Specifically, it first summarizes obfuscation approaches that are commonly used by app developers for code optimization, to protect their software against code theft and code tampering but are also frequently misused by malware developers to circumvent anti-malware products. Secondly, the article focuses on obfuscation detection techniques and presents various available tools and current research. Thirdly, deobfuscation (which aims at reinstating the original state before obfuscation) is discussed followed by a brief discussion how this impacts forensic investigation. We conclude that although obfuscation is widely used in Android app development (benign and malicious), available tools and the practices on how to deal with obfuscation are not standardized, and so are inherently lacking from a forensic standpoint.
AB - Android obfuscation techniques include not only classic code obfuscation techniques that were adapted to Android, but also obfuscation methods that target the Android platform specifically. This work examines the status-quo of Android obfuscation, obfuscation detection and deobfuscation. Specifically, it first summarizes obfuscation approaches that are commonly used by app developers for code optimization, to protect their software against code theft and code tampering but are also frequently misused by malware developers to circumvent anti-malware products. Secondly, the article focuses on obfuscation detection techniques and presents various available tools and current research. Thirdly, deobfuscation (which aims at reinstating the original state before obfuscation) is discussed followed by a brief discussion how this impacts forensic investigation. We conclude that although obfuscation is widely used in Android app development (benign and malicious), available tools and the practices on how to deal with obfuscation are not standardized, and so are inherently lacking from a forensic standpoint.
KW - Android application forensic
KW - Deobfuscation
KW - Literature review
KW - Obfuscation
KW - Obfuscation detection
KW - Reverse engineering
KW - Survey
UR - https://www.scopus.com/pages/publications/85122654677
U2 - 10.1016/j.fsidi.2021.301285
DO - 10.1016/j.fsidi.2021.301285
M3 - Review article
AN - SCOPUS:85122654677
SN - 2666-2825
VL - 39
JO - Forensic Science International: Digital Investigation
JF - Forensic Science International: Digital Investigation
M1 - 301285
ER -