TY - GEN
T1 - Two control computation transformation methods for obfuscating Java soft software
AU - Chen, Hsiang Yang
AU - Hou, Ting Wei
N1 - Copyright:
Copyright 2008 Elsevier B.V., All rights reserved.
PY - 2005
Y1 - 2005
N2 - Protection of Java code from malicious modifications is an important issue. A defense against reverse engineering is obfuscation. Two control flow obfuscation methods for protecting Java code at the bytecode level are proposed. They are no initial variable obfuscation (NIVO) and breaking for-loop obfuscation (BFLO). The new methods were tested against the decompiler Jad. Both the no initial variable obfuscation and the breaking for-loop obfuscation successfully defeated the decompiler Jad.
AB - Protection of Java code from malicious modifications is an important issue. A defense against reverse engineering is obfuscation. Two control flow obfuscation methods for protecting Java code at the bytecode level are proposed. They are no initial variable obfuscation (NIVO) and breaking for-loop obfuscation (BFLO). The new methods were tested against the decompiler Jad. Both the no initial variable obfuscation and the breaking for-loop obfuscation successfully defeated the decompiler Jad.
UR - http://www.scopus.com/inward/record.url?scp=33644510098&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33644510098&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:33644510098
SN - 0889864853
SN - 9780889864856
T3 - Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005
SP - 48
EP - 52
BT - Proceedings of the IASTED International Conference on Web Technologies, Applications, and Services, WTAS 2005
A2 - Hamza, M.H.
T2 - International Conference on Web Technologies, Applications, and Services, WTAS 2005
Y2 - 4 July 2005 through 6 July 2005
ER -