Two control computation transformation methods for obfuscating Java soft software

Hsiang Yang Chen, Ting Wei Hou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Protection of Java code from malicious modifications is an important issue. A defense against reverse engineering is obfuscation. Two control flow obfuscation methods for protecting Java code at the bytecode level are proposed. They are no initial variable obfuscation (NIVO) and breaking for-loop obfuscation (BFLO). The new methods were tested against the decompiler Jad. Both the no initial variable obfuscation and the breaking for-loop obfuscation successfully defeated the decompiler Jad.

Original languageEnglish
Title of host publicationProceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005
EditorsM.H. Hamza
Pages48-52
Number of pages5
Publication statusPublished - 2005
EventInternational Conference on Web Technologies, Applications, and Services, WTAS 2005 - Calgary, AB, Canada
Duration: 2005 Jul 42005 Jul 6

Publication series

NameProceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005

Other

OtherInternational Conference on Web Technologies, Applications, and Services, WTAS 2005
CountryCanada
CityCalgary, AB
Period05-07-0405-07-06

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'Two control computation transformation methods for obfuscating Java soft software'. Together they form a unique fingerprint.

Cite this