Two control computation transformation methods for obfuscating Java soft software

Hsiang Yang Chen, Ting Wei Hou

研究成果: Conference contribution

摘要

Protection of Java code from malicious modifications is an important issue. A defense against reverse engineering is obfuscation. Two control flow obfuscation methods for protecting Java code at the bytecode level are proposed. They are no initial variable obfuscation (NIVO) and breaking for-loop obfuscation (BFLO). The new methods were tested against the decompiler Jad. Both the no initial variable obfuscation and the breaking for-loop obfuscation successfully defeated the decompiler Jad.

原文English
主出版物標題Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005
編輯M.H. Hamza
頁面48-52
頁數5
出版狀態Published - 2005
事件International Conference on Web Technologies, Applications, and Services, WTAS 2005 - Calgary, AB, Canada
持續時間: 2005 7月 42005 7月 6

出版系列

名字Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005

Other

OtherInternational Conference on Web Technologies, Applications, and Services, WTAS 2005
國家/地區Canada
城市Calgary, AB
期間05-07-0405-07-06

All Science Journal Classification (ASJC) codes

  • 工程 (全部)

指紋

深入研究「Two control computation transformation methods for obfuscating Java soft software」主題。共同形成了獨特的指紋。

引用此