Technique of Javascript Code Obfuscation Based on Control Flow Tansformations

Article Preview

Abstract:

With the rapid development of scripting language, javascript has been widely used in the application and web development industry.One of the main disadvantages of javascript for developers of commercial applications is the ease by which customers and competitors can study, analyze, and reuse the source code . Therefore, this paper proposes a technique of javascript code obfuscation based on control flow tansformations. The experimental results prove that,its effective protect javascript source code.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

391-394

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Collberg, C.S., C.D. Thomborson and D.W.K. Low, Obfuscation techniques for enhancing software security. 2003, Google Patents.

Google Scholar

[2] Borello, J.M. and L. M E, Code obfuscation techniques for metamorphic viruses. Journal in Computer Virology, 2008. 4(3): pp.211-220.

DOI: 10.1007/s11416-008-0084-2

Google Scholar

[3] Ellison, G. and S.F. Ellison, Search, obfuscation, and price elasticities on the internet. Econometrica, 2009. 77(2): pp.427-452.

DOI: 10.3982/ecta5708

Google Scholar

[4] Collberg, C., et al., Toward Digital Asset Protection. Intelligent Systems, IEEE, 2011. 26(6): pp.8-13.

Google Scholar

[5] Zhuang, X., Zhang, T., Lee, H.H.S., Pande, S.: Hardware assisted control flow obfuscation for embedded processors. In: CASES '04: Proceedings of the (2004).

DOI: 10.1145/1023833.1023873

Google Scholar

[6] C. Curtsinger, B. Livshits, B. Zorn, and C. Seifert. Zozzle: Fast and precise in-browser JavaScript malware detection. In USENIX Security Symposium, (2011).

Google Scholar

[7] O. Hallaraker and G. Vigna. Detecting malicious JavaScript code in mozilla. In Proc. 10th IEEE International Conference on Engineering of Complex Computer Systems, pages 85–94, june (2005).

DOI: 10.1109/iceccs.2005.35

Google Scholar