Obfuscation of executable code

作者: Chenghui Luo , Jian Zhao

DOI:

关键词:

摘要: Three new obfuscation techniques. Data field replaces references to data fields that use an object name and a with but do not name. Obfuscation using the reflection mechanism for executable code works by replacing construct in one or more equivalent constructs made mechanism. of externally-defined is done relating used within code. The relationship defined portion code, at least externally-fined encrypted portion. various techniques may be each other previously-known disclosed are particularly well-adapted byte codes produced Java language compilers from programs.

参考文章(8)
Hiroshi Maruyama, Hisashi Kojima, Method and system for protecting resource central programs ,(2001)
Stanley T. Chow, Harold J. Johnson, Yuan Gu, Tamper resistant software-control flow encoding ,(1999)
Keith L. Shippy, Richard L. Maliszewski, Jody L. Pfotenhauer, Joseph M. Nardone, Richard P. Mangold, David W. Aucsmith, Gary L. Graunke, Tamper resistant methods and apparatus ,(1997)
Marc Cooperman, Scott A. Moskowitz, Method for stega-cipher protection of computer code ,(1996)
Christian Sven Collberg, Douglas Wai Kok Low, Clark David Thomborson, Obfuscation techniques for enhancing software security ,(1998)