Two control computation transformation methods for obfuscating Java soft software

Hsiang Yang Chen, Ting Wei Hou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Protection of Java code from malicious modifications is an important issue. A defense against reverse engineering is obfuscation. Two control flow obfuscation methods for protecting Java code at the bytecode level are proposed. They are no initial variable obfuscation (NIVO) and breaking for-loop obfuscation (BFLO). The new methods were tested against the decompiler Jad. Both the no initial variable obfuscation and the breaking for-loop obfuscation successfully defeated the decompiler Jad.

Original languageEnglish
Title of host publicationProceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005
EditorsM.H. Hamza
Pages48-52
Number of pages5
Publication statusPublished - 2005 Dec 1
EventInternational Conference on Web Technologies, Applications, and Services, WTAS 2005 - Calgary, AB, Canada
Duration: 2005 Jul 42005 Jul 6

Publication series

NameProceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005

Other

OtherInternational Conference on Web Technologies, Applications, and Services, WTAS 2005
CountryCanada
CityCalgary, AB
Period05-07-0405-07-06

Fingerprint

Reverse engineering
Flow control

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

Chen, H. Y., & Hou, T. W. (2005). Two control computation transformation methods for obfuscating Java soft software. In M. H. Hamza (Ed.), Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005 (pp. 48-52). (Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005).
Chen, Hsiang Yang ; Hou, Ting Wei. / Two control computation transformation methods for obfuscating Java soft software. Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005. editor / M.H. Hamza. 2005. pp. 48-52 (Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005).
@inproceedings{8e0bb1ed67c54fdba6f8508f74900da3,
title = "Two control computation transformation methods for obfuscating Java soft software",
abstract = "Protection of Java code from malicious modifications is an important issue. A defense against reverse engineering is obfuscation. Two control flow obfuscation methods for protecting Java code at the bytecode level are proposed. They are no initial variable obfuscation (NIVO) and breaking for-loop obfuscation (BFLO). The new methods were tested against the decompiler Jad. Both the no initial variable obfuscation and the breaking for-loop obfuscation successfully defeated the decompiler Jad.",
author = "Chen, {Hsiang Yang} and Hou, {Ting Wei}",
year = "2005",
month = "12",
day = "1",
language = "English",
isbn = "0889864853",
series = "Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005",
pages = "48--52",
editor = "M.H. Hamza",
booktitle = "Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005",

}

Chen, HY & Hou, TW 2005, Two control computation transformation methods for obfuscating Java soft software. in MH Hamza (ed.), Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005. Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005, pp. 48-52, International Conference on Web Technologies, Applications, and Services, WTAS 2005, Calgary, AB, Canada, 05-07-04.

Two control computation transformation methods for obfuscating Java soft software. / Chen, Hsiang Yang; Hou, Ting Wei.

Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005. ed. / M.H. Hamza. 2005. p. 48-52 (Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Two control computation transformation methods for obfuscating Java soft software

AU - Chen, Hsiang Yang

AU - Hou, Ting Wei

PY - 2005/12/1

Y1 - 2005/12/1

N2 - Protection of Java code from malicious modifications is an important issue. A defense against reverse engineering is obfuscation. Two control flow obfuscation methods for protecting Java code at the bytecode level are proposed. They are no initial variable obfuscation (NIVO) and breaking for-loop obfuscation (BFLO). The new methods were tested against the decompiler Jad. Both the no initial variable obfuscation and the breaking for-loop obfuscation successfully defeated the decompiler Jad.

AB - Protection of Java code from malicious modifications is an important issue. A defense against reverse engineering is obfuscation. Two control flow obfuscation methods for protecting Java code at the bytecode level are proposed. They are no initial variable obfuscation (NIVO) and breaking for-loop obfuscation (BFLO). The new methods were tested against the decompiler Jad. Both the no initial variable obfuscation and the breaking for-loop obfuscation successfully defeated the decompiler Jad.

UR - http://www.scopus.com/inward/record.url?scp=33644510098&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33644510098&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33644510098

SN - 0889864853

SN - 9780889864856

T3 - Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005

SP - 48

EP - 52

BT - Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005

A2 - Hamza, M.H.

ER -

Chen HY, Hou TW. Two control computation transformation methods for obfuscating Java soft software. In Hamza MH, editor, Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005. 2005. p. 48-52. (Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005).