Abstract
In this research, we are reverse engineering an APK file using the GUI version of the JADX tool. We are receiving two folders from JADX, namely Sources and Resources. Sources contain three thousand files, and similarly, resources include hundreds of files. The source code in the source folder was in obfuscated form. To read code in an obfuscated form, we harness the power of AI by giving our code to ChatGPT and asking it to find a secret flag inside. We discovered a hidden debug flag (debug_bypass_phenotype).
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the 2025 IEEE Madhya Pradesh Section Conference (MPCON 2025), 29th - 30th August 2025, Jabalpur, India |
| Place of Publication | U.S. |
| Publisher | IEEE |
| Pages | 848-851 |
| Number of pages | 4 |
| ISBN (Electronic) | 9798331512859 |
| DOIs | |
| Publication status | Published - 2025 |
| Event | IEEE Madhya Pradesh Section Conference - Jabalpur, India Duration: 29 Aug 2025 → 30 Aug 2025 |
Conference
| Conference | IEEE Madhya Pradesh Section Conference |
|---|---|
| Abbreviated title | MPCON |
| Country/Territory | India |
| City | Jabalpur |
| Period | 29/08/25 → 30/08/25 |
Keywords
- APK
- ChatGPT
- Deobfuscation using AI
- JADX
- Obfuscation
- Reverse Engineering
- Secret Flag
Fingerprint
Dive into the research topics of 'AI-powered deobfuscation: a novel approach to understanding reverse engineered code'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver