Technique of Code Obfuscation Based on Class Structure

Article Preview

Abstract:

Software protection technology is necessary for software security and property right of software. The algorithm of code obfuscation based on class is proposed that uses of obfuscation technology. The overall architecture of the system is hidden by changing the class diagram for class aggregation, and the algorithm of class aggregation can be used to design class hierarchy in object-oriented program. It makes static analysis difficult while preserving function of program. The interfaces replace original classes to achieve reference in order to implement type hidden, and automatic analysis becomes more difficult.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

674-678

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] W. Yibin, C. Yiyun: Progress of Research on Code Obfuscation Technology. Journal of Jilin University, 7(2008), p.386.

Google Scholar

[2] S.K. Udupa, S.K. Debray, M. Madou: Deobfuscation: Reverse Engineering Obfuscated Code. Proceedings of the 12th Working Conference on Reverse Engineering, (2005).

DOI: 10.1109/wcre.2005.13

Google Scholar

[3] H. Yamauchi, A. Monden and M. Nakamura: A Goal-Oriented Approach to Software Obfuscation. Computer Science and Network Security, 8(2008), p.59.

Google Scholar

[4] J.T. Chan, W.U. Yang: Advanced Obfuscation Techniques for Java Bytecode. The Journal of Systems and Software, 71(2004), p.1.

Google Scholar

[5] K. Heffner, C. Collerberg: The Obfuscation Executive. Information Security Conference, LNCS3225, 74(2004) . p.428.

Google Scholar

[6] D. Predam, G. Bazzir: Semantic-Based Code Obfuscation by Abstract Interpretation. Proceedings of the ICALP'05(2005), p.1325.

Google Scholar

[7] S. Yaqi, L. Li: Experiment with control code obfuscation. Journal of Communication and Computer, 4(2007), p.59.

Google Scholar

[8] W. Zhu, C. Thomobrson and W. Feiyue: Applications of Homomorphic Functions to Software Obfuscation. WISI, 25(2006), p.153.

Google Scholar