Preventing Reverse Engineering Threat in Java Using Byte Code Obfuscation Techniques

作者: Jan Memon , Shams-ul-arfeen , Asghar Mughal , Faisal Memon

DOI: 10.1109/ICET.2006.335944

关键词:

摘要: Java programs are complied in to a platform independent byte code format. Much of the information contained source is retained code. Consequently reverse engineering becomes much easier. Several software protection techniques have been developed, which, obfuscation seems be promising one. In this paper, two new evolved. These involve applying obfuscating transformations prevent automatic analysis tools, de-compilers, from producing correct by introducing syntax and semantic errors generated The proposed applied on sample class files examine effectiveness impeding engineering. results reveal erroneous codes tested de-compilers

参考文章(16)
Bruno De Bus, Koen De Bosschere, Bertrand Anckaert, Jan Cappaert, Matias Madou, Bart Preneel, On the Effectiveness of Source Code Transformations for Binary Obfuscation international conference on software engineering. pp. 527- 533 ,(2006)
Levent Ertaul, Suma Venkatesh, Novel Obfuscation Algorithms for Software Security. Software Engineering Research and Practice. pp. 209- 215 ,(2005)
Bill Joy, James Gosling, Guy Steele, Gilad Bracha, Java(TM) Language Specification, The (3rd Edition) (Java (Addison-Wesley)) Addison-Wesley Professional. ,(2005)
Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto, Yuichiro Kanzaki, Hiroki Yamauchi, Software obfuscation from crackers' viewpoint ACST'06 Proceedings of the 2nd IASTED international conference on Advances in computer science and technology. pp. 286- 291 ,(2006)
Bill Joy, Guy Steele, James Gosling, Gilad Bracha, None, The Java Language Specification ,(1996)
C. Collberg, C. Thomborson, D. Low, Breaking abstractions and unstructuring data structures international conference on computational logistics. pp. 28- 38 ,(1998) , 10.1109/ICCL.1998.674154
M.R. Stytz, Considering defense in depth for software applications ieee symposium on security and privacy. ,vol. 2, pp. 72- 75 ,(2004) , 10.1109/MSECP.2004.1264860
M.R. Stytz, J.A. Whittaker, Software protection: security's last stand? ieee symposium on security and privacy. ,vol. 1, pp. 95- 98 ,(2003) , 10.1109/MSECP.2003.1177004
D.E. Bakken, R. Rarameswaran, D.M. Blough, A.A. Franz, T.J. Palmer, Data obfuscation: anonymity and desensitization of usable data sets ieee symposium on security and privacy. ,vol. 2, pp. 34- 41 ,(2004) , 10.1109/MSP.2004.97