Proj. CAR Paper Reading: Statistical Deobfuscation of Android Applications
Abstract
本文:
工具:DEGUARD
任务:reversing layout obfuscation(重命名class, package和method)
具体包括
- reverse the layout obfuscation
- 预测APKs引用的库
- 重命名程序中的一些元素
方法:用大量的non-obfuscated Android applications来学习deobfuscate新的Android APK
步骤:
- 将layout obfuscation反混淆表述为structured prediction in a prob graphical model
- 使用描述Android Settings的特征和constraints来训练模型,确保准确度和语义准确
- 使用推测和学习算法(第三方?)来获取整体精度
实验:
- recovers 79.1% of the program element names obfuscated with ProGuard
- predicts third-party libraries with accuracy of 91.3%,
- reveals string decoders and classes that handle sensitive data in Android malware.