作者: Chenghui Luo , Jian Zhao
DOI:
关键词:
摘要: Three new obfuscation techniques. Data field replaces references to data fields that use an object name and a with but do not name. Obfuscation using the reflection mechanism for executable code works by replacing construct in one or more equivalent constructs made mechanism. of externally-defined is done relating used within code. The relationship defined portion code, at least externally-fined encrypted portion. various techniques may be each other previously-known disclosed are particularly well-adapted byte codes produced Java language compilers from programs.