Skip navigation
瀏覽
學術出版
教師專書
期刊論文
會議論文
研究計畫
畢業論文
專利資料
技術報告
數位教材
開放式課程
專題作品
喀報
交大建築展
明竹
活動紀錄
圖書館週
研究攻略營
畢業典禮
開學典禮
數位典藏
楊英風數位美術館
詩人管管數位典藏
歷史新聞
交大 e-News
交大友聲雜誌
陽明交大電子報
陽明交大英文電子報
陽明電子報
校內出版品
交大出版社
交大法學評論
管理與系統
新客家人群像
全球客家研究
犢:傳播與科技
資訊社會研究
交大資訊人
交大管理學報
數理人文
交大學刊
交通大學學報
交大青年
交大體育學刊
陽明神農坡彙訊
校務大數據研究中心電子報
人間思想
文化研究
萌牙會訊
Inter-Asia Cultural Studies
醫學院年報
醫學院季刊
陽明交大藥學系刊
項目
公開日期
作者
標題
關鍵字
研究人員
English
繁體
简体
目前位置:
國立陽明交通大學機構典藏
學術出版
期刊論文
完整後設資料紀錄
DC 欄位
值
語言
dc.contributor.author
Chan, JT
en_US
dc.contributor.author
Yang, W
en_US
dc.date.accessioned
2014-12-08T15:39:21Z
-
dc.date.available
2014-12-08T15:39:21Z
-
dc.date.issued
2004-04-01
en_US
dc.identifier.issn
0164-1212
en_US
dc.identifier.uri
http://dx.doi.org/10.1016/S0164-1212(02)00066-3
en_US
dc.identifier.uri
http://hdl.handle.net/11536/26885
-
dc.description.abstract
There exist several obfuscation tools for preventing Java bytecode from being decompiled. Most of these tools simply scramble the names of the identifiers stored in a bytecode by substituting the identifiers with meaningless names. However, the scrambling technique cannot deter a determined cracker very long. We propose several advanced obfuscation techniques that make Java bytecode impossible to recompile or make the decompiled program difficult to understand and to recompile. The crux of our approach is to over use an identifier. That is, an identifier can denote several entities, such as types, fields, and methods, simultaneously. An additional benefit is that the size of the bytecode is reduced because fewer and shorter identifier names are used. Furthermore, we also propose several techniques to intentionally introduce syntactic and semantic errors into the decompiled program while preserving the original behaviors of the bytecode. Thus, the decompiled program would have to be debugged manually. Although our basic approach is to scramble the identifiers in Java bytecode, the scrambled bytecode produced with our techniques is much harder to crack than that produced with other identifier scrambling techniques. Furthermore, the run-time efficiency of the obfuscated bytecode is also improved because the size of the bytecode becomes smaller after obfuscation. (C) 2002 Elsevier Inc. All rights reserved.
en_US
dc.language.iso
en_US
en_US
dc.subject
program protection
en_US
dc.subject
bytecode obfuscation
en_US
dc.subject
Java programming language
en_US
dc.title
Advanced obfuscation techniques for Java bytecode
en_US
dc.type
Article
en_US
dc.identifier.doi
10.1016/S0164-1212(02)00066-3
en_US
dc.identifier.journal
JOURNAL OF SYSTEMS AND SOFTWARE
en_US
dc.citation.volume
71
en_US
dc.citation.issue
1-2
en_US
dc.citation.spage
1
en_US
dc.citation.epage
10
en_US
dc.contributor.department
資訊工程學系
zh_TW
dc.contributor.department
Department of Computer Science
en_US
dc.identifier.wosnumber
WOS:000220336900001
-
dc.citation.woscount
16
-
顯示於類別:
期刊論文
文件中的檔案:
存到雲端
000220336900001.pdf
若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。
IR@NYCU
CrossRef
Java程式語言之改進研究 / 陳建財;Jien-Tsai Chan;楊武;Wuu Yang
透過例外機制實作程式模糊化 / 黃致超;Huang, Chih-Chao;楊 武;Yang, Wuu
以定性的有限狀態機為基礎的Java程式 / 趙博民;Poi-Ming Chao;楊武;Wuu Yang
A Graph Approach to Quantitative Analysis of Control-Flow Obfuscating Transformations / Tsai, Hsin-Yi;Huang, Yu-Lun;Wagner, David
Design of an optimal folding mechanism for Java processors / Ton, LR;Chang, LC;Shann, JJ;Chung, CP
保護Java程式之研究 / 陳承駿;吳毅成;I-Chen Wu
EJVM: an economic Java run-time environment for embedded devices / Chang, DW;Chang, RC
A software/hardware cooperated stack operations folding model for Java processors / Ton, LR;Chang, LC;Shann, JJ;Chung, CP
An analytical POC stack operations folding for continuous and discontinuous Java bytecodes / Ton, LR;Chang, LC;Chung, CP
Loading...