A survey on Java program obfuscation techniques

被引:0
|
作者
School of Software, Tsinghua University, Beijing 100084, China [1 ]
不详 [2 ]
不详 [3 ]
不详 [4 ]
机构
来源
Jisuanji Xuebao | / 9卷 / 1578-1588期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Surveys
引用
收藏
相关论文
共 50 条
  • [1] Advanced obfuscation techniques for Java']Java bytecode
    Chan, JT
    Yang, W
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 71 (1-2) : 1 - 10
  • [2] An inter-classes obfuscation method for Java']Java program
    Zhang, Xuesong
    He, Fengling
    Zuo, Wanli
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 360 - 365
  • [3] Statically Detecting Java']JavaScript Obfuscation and Minification Techniques in the Wild
    Moog, Marvin
    Demmel, Markus
    Backes, Michael
    Fass, Aurore
    [J]. 51ST ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2021), 2021, : 569 - 580
  • [4] Preventing reverse engineering threat in Java']Java using byte code obfuscation techniques
    Memon, Jan M.
    Shams-ul-Arfeen
    Mughal, Asghar
    Memon, Faisal
    [J]. SECOND INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES 2006, PROCEEDINGS, 2006, : 689 - +
  • [5] A qualitative analysis of Java']Java obfuscation
    Karnick, Matthew
    MacBride, Jeffrey
    McGinnis, Sean
    Tang, Ying
    Ramachandran, Ravi
    [J]. PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND APPLICATIONS, 2006, : 166 - +
  • [6] Securing Java']Java-Based mobile agents through byte code obfuscation techniques
    Shah, Syed Waqar
    Nixon, P.
    Ferguson, R. I.
    Hassnain, Syed Riaz ul
    Arbab, M. Naeem
    Khan, Laiq
    [J]. 10TH IEEE INTERNATIONAL MULTITOPIC CONFERENCE 2006, PROCEEDINGS, 2006, : 305 - +
  • [7] Detection of obfuscation in java']java malware
    Kumar, Renuka
    Vaishakh, Anand Raj Essar
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 521 - 529
  • [8] The Power of Obfuscation Techniques in Malicious Java']JavaScript Code: A Measurement Study
    Xu, Wei
    Zhang, Fangfang
    Zhu, Sencun
    [J]. PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2012, : 9 - 16
  • [9] A primer on Java obfuscation
    Auburn University
    不详
    不详
    不详
    [J]. CrossTalk, 2007, 12 (19-23): : 19 - 23
  • [10] Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations
    Zhang, Xiaolu
    Breitinger, Frank
    Luechinger, Engelbert
    O'Shaughnessy, Stephen
    [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 39