咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Three control flow obfuscation... 收藏

Three control flow obfuscation methods for Java software

作     者:Hou, T. W. Chen, H. Y. Tsai, M. H. 

作者机构:Natl Cheng Kung Univ Dept Engn Sci Network Comp Lab Tainan 701 Taiwan 

出 版 物:《IEE PROCEEDINGS-SOFTWARE》 (IEE Proc Software)

年 卷 期:2006年第153卷第2期

页      面:80-86页

核心收录:

主  题:DATA protection COMPUTER software COMPUTER software development JAVA (Computer program language) COMPUTER files LOOPS (Group theory) 

摘      要:Three novel control computation (control flow) obfuscation methods are described for protecting Java class files. They are basic block fission obfuscation, intersecting loop obfuscation and replacing goto obfuscation. The basic block fission obfuscation splits some chosen basic block(s) into more basic blocks, in which opaque predicates and goto instructions are inserted to make decompiling unsuccessful. The intersecting loop obfuscation intersects two loops and then adds this pattern into programs. The intersecting loop structure should not appear in a Java source program or a class file. The replacing goto obfuscation replaces goto instructions with conditional branch instructions. The new methods were tested against 16 decompilers. The study also implemented multi-level exit obfuscation and single-level exit obfuscation for comparison. Both the intersecting loop obfuscation and the replacing goto obfuscation successfully defeated all the decompilers.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分