Protecting Million-User iOS Apps with Obfuscation: Motivations, Pitfalls, and Experience
In recent years, mobile apps have become the infrastructure of many popular Internet services. It is now fairly common that a mobile app serves a large number of users across the globe. Different from webbased services whose important program logic is mostly placed on remote servers, many mobile apps require complicated client-side code to perform tasks that are critical to the businesses. The code of mobile apps can be easily accessed by any party after the software is installed on a rooted or jailbroken device. By examining the code, skilled reverse engineers can learn various knowledge about the design and implementation of an app. Real-world cases have shown that the disclosed critical information allows malicious parties to abuse or exploit the app-provided services for unrightful profits, leading to significant financial losses for app vendors.
One of the most viable mitigations against malicious reverse engineering is to obfuscate the software before release. Despite that security by obscurity is typically considered to be an unsound protection methodology, software obfuscation can indeed increase the cost of reverse engineering, thus delivering practical merits for protecting mobile apps.
In this paper, we share our experience of applying obfuscation to multiple commercial iOS apps, each of which has millions of users. We discuss the necessity of adopting obfuscation for protecting modern mobile business, the challenges of software obfuscation on the iOS platform, and our efforts in overcoming these obstacles. Our report can benefit many stakeholders in the iOS ecosystem, including developers, security service providers, and Apple as the administrator of the ecosystem.
|Presentation Slides (ICSE18-SEIP.pptx)||2.12MiB|
Fri 1 Jun
|14:00 - 14:20|
|14:20 - 14:40|
Flavio ToffaliniSingapore University of Technology and Design, Jun SunSingapore University of Technology and Design, Martin OchoaSingapore University of Technology and DesignMedia Attached
|14:40 - 15:00|
Ciera Jaspan, Matthew Jorde, Andrea Knight, Caitlin SadowskiGoogle, Edward Smith, Collin WinterGoogle, Emerson Murphy-HillNorth Carolina State UniversityPre-print
|15:00 - 15:20|
|Pre-print File Attached|
|15:20 - 15:30|