版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Natl Cheng Kung Univ Dept Engn Sci Network Comp Lab Tainan 701 Taiwan
出 版 物:《IEE PROCEEDINGS-SOFTWARE》 (IEE Proc Software)
年 卷 期:2006年第153卷第2期
页 面:80-86页
核心收录:
主 题:DATA protection COMPUTER software COMPUTER software development JAVA (Computer program language) COMPUTER files LOOPS (Group theory)
摘 要:Three novel control computation (control flow) obfuscation methods are described for protecting Java class files. They are basic block fission obfuscation, intersecting loop obfuscation and replacing goto obfuscation. The basic block fission obfuscation splits some chosen basic block(s) into more basic blocks, in which opaque predicates and goto instructions are inserted to make decompiling unsuccessful. The intersecting loop obfuscation intersects two loops and then adds this pattern into programs. The intersecting loop structure should not appear in a Java source program or a class file. The replacing goto obfuscation replaces goto instructions with conditional branch instructions. The new methods were tested against 16 decompilers. The study also implemented multi-level exit obfuscation and single-level exit obfuscation for comparison. Both the intersecting loop obfuscation and the replacing goto obfuscation successfully defeated all the decompilers.