JConstHide: A Framework for Java']Java Source Code Constant Hiding

被引:0
|
作者
Sivadasan, Praveen [1 ]
Lal, P. Sojan [1 ]
Sivadasan, Naveen [2 ]
机构
[1] Mahatma Gandhi Univ, Sch Comp Sci, Kottayam, Kerala, India
[2] Tata Consultancy Serv, TCS Innovat Labs, Hyderabad, Andhra Pradesh, India
来源
关键词
Reverse Engineering; Constant Hiding; JConstHide; Source Code Obfuscation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the program in a semi complied form called 'byte' codes. The existing obfuscation systems obfuscate the Java class files. Obfuscated source code produce obfuscated byte codes and hence two level obfuscation (source code and byte code level) of the program makes it more resilient to reverse engineering attacks.. But source code obfuscation is much more difficult due to richer set of programming constructs and the scope of the different variables used in the program and only very little progress has been made on this front. We in this paper are proposing a framework named 'JConstHide' for hiding constants, especially integers in the java source codes, to defeat reverse engineering through decompilation. To the best of our knowledge, no data hiding software are available for java source code constant hiding.
引用
收藏
页码:21 / 29
页数:9
相关论文
共 50 条
  • [1] Java']JavaML: a markup language for Java']Java source code
    Badros, GJ
    [J]. COMPUTER NETWORKS, 2000, 33 (1-6) : 159 - 177
  • [2] Java']Java Source Code Defect Detection
    Zhu, Hong
    Jin, Dahai
    [J]. 2015 8TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI), 2015, : 695 - 699
  • [3] Indexing the Java']Java API using source code
    Ma, Homan
    Amor, Robert
    Tempero, Ewan
    [J]. ASWEC 2008: 19TH AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2008, : 451 - 460
  • [4] Topology Structure and Centrality in A Java']Java Source Code
    Ying, Long
    Ding, De-wu
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC 2012), 2012, : 787 - 789
  • [5] Automated Translation of Java']Java Source Code to Eiffel
    Trudel, Marco
    Oriol, Manuel
    Furia, Carlo A.
    Nordio, Martin
    [J]. OBJECTS, MODELS, COMPONENTS, PATTERNS, TOOLS 2011, 2011, 6705 : 20 - 35
  • [6] To Generate the Ontology from Java']Java Source Code
    Ganapathy, Gopinath
    Sagayaraj, S.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (02) : 111 - 116
  • [7] Application of Statistical Classifiers on Java']Java Source Code
    Mojzes, Matej
    Rost, Michal
    Smolka, Josef
    Virius, Miroslav
    [J]. PROCEEDINGS OF THE 2015 FEDERATED CONFERENCE ON SOFTWARE DEVELOPMENT AND OBJECT TECHNOLOGIES, 2017, 511 : 208 - 218
  • [8] Scripting Language for Java']Java Source Code Recognition
    Bublik, Tomas
    Virius, Miroslav
    [J]. INTERNATIONAL CONFERENCE ON FUTURE INFORMATION ENGINEERING (FIE 2014), 2014, 10 : 119 - 130
  • [9] Java']JavaCompExt: Extracting Architectural Elements from Java']Java Source Code
    Anquetil, Nicolas
    Royer, Jean-Claude
    Andre, Pascal
    Ardourel, Gilles
    Hnetynka, Petr
    Poch, Tomas
    Petrascu, Dragos
    Petrascu, Vladiela
    [J]. 16TH WORKING CONFERENCE ON REVERSE ENGINEERING (WCRE 2009), 2009, : 317 - +
  • [10] Code coverage differences of Java']Java bytecode and source code instrumentation tools
    Horvath, Ferenc
    Gergely, Tamas
    Beszedes, Arpad
    Tengeri, David
    Balogh, Gergo
    Gyimothy, Tibor
    [J]. SOFTWARE QUALITY JOURNAL, 2019, 27 (01) : 79 - 123