Three control flow obfuscation methods for Java software

Ting-Wei Hou, H. Y. Chen, M. H. Tsai

Research output: Contribution to journalArticle

30 Citations (Scopus)

Abstract

Three novel control computation (control flow) obfuscation methods are described for protecting Java class files. They are basic block fission obfuscation, intersecting loop obfuscation and replacing goto obfuscation. The basic block fission obfuscation splits some chosen basic block(s) into more basic blocks, in which opaque predicates and goto instructions are inserted to make decompiling unsuccessful. The intersecting loop obfuscation intersects two loops and then adds this pattern into programs. The intersecting loop structure should not appear in a Java source program or a class file. The replacing goto obfuscation replaces goto instructions with conditional branch instructions. The new methods were tested against 16 decompilers. The study also implemented multi-level exit obfuscation and single-level exit obfuscation for comparison. Both the intersecting loop obfuscation and the replacing goto obfuscation successfully defeated all the decompilers.

Original languageEnglish
Pages (from-to)80-86
Number of pages7
JournalIEE Proceedings: Software
Volume153
Issue number2
DOIs
Publication statusPublished - 2006 Jul 20

Fingerprint

Flow control

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Graphics and Computer-Aided Design

Cite this

Hou, Ting-Wei ; Chen, H. Y. ; Tsai, M. H. / Three control flow obfuscation methods for Java software. In: IEE Proceedings: Software. 2006 ; Vol. 153, No. 2. pp. 80-86.
@article{9e55942510404becb01ee03c8682c2e7,
title = "Three control flow obfuscation methods for Java software",
abstract = "Three novel control computation (control flow) obfuscation methods are described for protecting Java class files. They are basic block fission obfuscation, intersecting loop obfuscation and replacing goto obfuscation. The basic block fission obfuscation splits some chosen basic block(s) into more basic blocks, in which opaque predicates and goto instructions are inserted to make decompiling unsuccessful. The intersecting loop obfuscation intersects two loops and then adds this pattern into programs. The intersecting loop structure should not appear in a Java source program or a class file. The replacing goto obfuscation replaces goto instructions with conditional branch instructions. The new methods were tested against 16 decompilers. The study also implemented multi-level exit obfuscation and single-level exit obfuscation for comparison. Both the intersecting loop obfuscation and the replacing goto obfuscation successfully defeated all the decompilers.",
author = "Ting-Wei Hou and Chen, {H. Y.} and Tsai, {M. H.}",
year = "2006",
month = "7",
day = "20",
doi = "10.1049/ip-sen:20050010",
language = "English",
volume = "153",
pages = "80--86",
journal = "IET Software",
issn = "1751-8806",
publisher = "Institution of Engineering and Technology",
number = "2",

}

Three control flow obfuscation methods for Java software. / Hou, Ting-Wei; Chen, H. Y.; Tsai, M. H.

In: IEE Proceedings: Software, Vol. 153, No. 2, 20.07.2006, p. 80-86.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Three control flow obfuscation methods for Java software

AU - Hou, Ting-Wei

AU - Chen, H. Y.

AU - Tsai, M. H.

PY - 2006/7/20

Y1 - 2006/7/20

N2 - Three novel control computation (control flow) obfuscation methods are described for protecting Java class files. They are basic block fission obfuscation, intersecting loop obfuscation and replacing goto obfuscation. The basic block fission obfuscation splits some chosen basic block(s) into more basic blocks, in which opaque predicates and goto instructions are inserted to make decompiling unsuccessful. The intersecting loop obfuscation intersects two loops and then adds this pattern into programs. The intersecting loop structure should not appear in a Java source program or a class file. The replacing goto obfuscation replaces goto instructions with conditional branch instructions. The new methods were tested against 16 decompilers. The study also implemented multi-level exit obfuscation and single-level exit obfuscation for comparison. Both the intersecting loop obfuscation and the replacing goto obfuscation successfully defeated all the decompilers.

AB - Three novel control computation (control flow) obfuscation methods are described for protecting Java class files. They are basic block fission obfuscation, intersecting loop obfuscation and replacing goto obfuscation. The basic block fission obfuscation splits some chosen basic block(s) into more basic blocks, in which opaque predicates and goto instructions are inserted to make decompiling unsuccessful. The intersecting loop obfuscation intersects two loops and then adds this pattern into programs. The intersecting loop structure should not appear in a Java source program or a class file. The replacing goto obfuscation replaces goto instructions with conditional branch instructions. The new methods were tested against 16 decompilers. The study also implemented multi-level exit obfuscation and single-level exit obfuscation for comparison. Both the intersecting loop obfuscation and the replacing goto obfuscation successfully defeated all the decompilers.

UR - http://www.scopus.com/inward/record.url?scp=33745945511&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745945511&partnerID=8YFLogxK

U2 - 10.1049/ip-sen:20050010

DO - 10.1049/ip-sen:20050010

M3 - Article

VL - 153

SP - 80

EP - 86

JO - IET Software

JF - IET Software

SN - 1751-8806

IS - 2

ER -