Deobfuscating Android native binary code

Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings(2019)

引用 17|浏览69
暂无评分
摘要
In this paper, we propose an automated approach to facilitate the deobfuscation of Android native binary code. Specifically, given a native binary obfuscated by Obfuscator-LLVM (the most popular native code obfuscator), our deobfuscation system is capable of recovering the original Control Flow Graph. To the best of our knowledge, it is the first work that aims to tackle the problem. We have applied our system in different scenarios, and the experimental results demonstrate the effectiveness of our system based on generic similarity comparison metrics.
更多
查看译文
关键词
Deobfuscation,Native Code,Android,Symbolic Execution,Taint Analysis
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要