Notice of Violation of IEEE Publication Principles Securing Java-Based Mobile Agents through Byte Code Obfuscation Techniques

作者: Syed Waqar Shah , P. Nixon , R.I. Ferguson , Syed Riaz ul Hassnain , M. Naeem Arbab

DOI: 10.1109/INMIC.2006.358182

关键词: JavaMobile computingComputer securityObfuscation (software)NoticeComputer scienceByte code

摘要:

参考文章(13)
Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto, Yuichiro Kanzaki, Hiroki Yamauchi, Software obfuscation from crackers' viewpoint ACST'06 Proceedings of the 2nd IASTED international conference on Advances in computer science and technology. pp. 286- 291 ,(2006)
Bill Joy, Guy Steele, James Gosling, Gilad Bracha, None, The Java Language Specification ,(1996)
C. Collberg, C. Thomborson, D. Low, Breaking abstractions and unstructuring data structures international conference on computational logistics. pp. 28- 38 ,(1998) , 10.1109/ICCL.1998.674154
M.R. Stytz, Considering defense in depth for software applications ieee symposium on security and privacy. ,vol. 2, pp. 72- 75 ,(2004) , 10.1109/MSECP.2004.1264860
M.R. Stytz, J.A. Whittaker, Software protection: security's last stand? ieee symposium on security and privacy. ,vol. 1, pp. 95- 98 ,(2003) , 10.1109/MSECP.2003.1177004
D.E. Bakken, R. Rarameswaran, D.M. Blough, A.A. Franz, T.J. Palmer, Data obfuscation: anonymity and desensitization of usable data sets ieee symposium on security and privacy. ,vol. 2, pp. 34- 41 ,(2004) , 10.1109/MSP.2004.97
Douglas Low, Protecting Java code via code obfuscation ACM Crossroads Student Magazine. ,vol. 4, pp. 21- 23 ,(1998) , 10.1145/332084.332092
A. Fuggetta, G.P. Picco, G. Vigna, Understanding code mobility IEEE Transactions on Software Engineering. ,vol. 24, pp. 342- 361 ,(1998) , 10.1109/32.685258
G. Naumovich, N. Memon, Preventing piracy, reverse engineering, and tampering IEEE Computer. ,vol. 36, pp. 64- 71 ,(2003) , 10.1109/MC.2003.1212692