Researches on JVMTI-Based Security Enhancement Techniques for Java Software

Article Preview

Abstract:

With the fast development of information technology, various software systems have been widely applied to production lines and office work. A lot of corporate data thus are stored and processed by these systems each day. Therefore, the security of the software systems is closely related to the data security and the core competitiveness of an enterprise. At present, Java becomes one of the most important programming languages of the enterprise application systems. Against its hidden risks that Trojans and Backdoors are easily implanted through decompilation, the author of this paper proposes a security enhancement technique based on JVMTI for Java software to effectively prevent the malicious users’ decompilation through encrypting the bytecode files, thereby enhancing the security of the software.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 998-999)

Pages:

1247-1252

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Baoqin Peng, Xiaopei Luo. Comparative evaluation of Spring 2. 0 and EJB3. 0 framework[J]. Computer Engineering and Design, 2008, 29(5): 1052-1054.

Google Scholar

[2] B. Venners. 2000. Inside the Java 2 virtual machine[M]. New York: McGraw-Hill companies.

Google Scholar

[3] M. Honeyford. 2000. Weighing in on Java native compilation[OL]. Developerworks. http: /www. ibm. com/developerworks/cn/java/j-native.

Google Scholar

[4] C. Collberg, C. Thomborson and D . Low. A Taxonomy of Obfuscating Transformations[C]. New Zealand: Dept. of Computer Science, University of Auckland, TR: 148, (1997).

Google Scholar

[5] B. Barak, O. Goldreich, et al. On the (Im)possibility of Obfuscating Programs[C], In the proceedings of CRYPTO-2001. LNCS Volume 2139, Springer-Verlag. Santa Barbara, CA, USA.

Google Scholar

[6] Dunhua Zhang, Jian Liu. Java class loading mechanism and its application[J]. Computer Engineering and Design, 2004, 25(3): 432-435.

Google Scholar

[7] Roubtsov. 2003. Cracking Java byte-code encryption[OL]. JavaWorld. http: /www. javaworld. com/javaqa/2003-05/01-qa-0509-jcrypt. html.

Google Scholar

[8] Xiufeng Zhang. 2008. 7. AOP Technology and Its Applications in Software Security[D]. Ph. D Dissertation. Beijing: Beijing university of posts and telecommunications.

Google Scholar

[9] JVM™ Tool Interface[OL]. http: /java. sun. com/j2se/l. 5. 0/docs/guide/jvmti/index. htmI.

Google Scholar