Technique of Code Obfuscation Based on Class Structure

被引:0
|
作者
Sun Yongyong [1 ]
Huang Guangqiu [1 ]
机构
[1] Xian Univ Architecture & Technol, Sch Management, Xian, Shaanxi, Peoples R China
关键词
code obfuscation; class structure; class aggregation; static analysis; type hidden;
D O I
10.4028/www.scientific.net/AMM.271-272.674
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software protection technology is necessary for software security and property right of software. The algorithm of code obfuscation based on class is proposed that uses of obfuscation technology. The overall architecture of the system is hidden by changing the class diagram for class aggregation, and the algorithm of class aggregation can be used to design class hierarchy in object-oriented program. It makes static analysis difficult while preserving function of program. The interfaces replace original classes to achieve reference in order to implement type hidden, and automatic analysis becomes more difficult.
引用
收藏
页码:674 / 678
页数:5
相关论文
共 50 条
  • [1] Technique of Code Obfuscation Based on Class Splitting
    Sun Yongyong
    Huang Guangqiu
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE III, PTS 1 AND 2, 2013, 271-272 : 636 - 640
  • [2] The Code Obfuscation Technology Based on Class Combination
    Xiang Guangli
    Cai Zheng
    PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE (DCABES 2010), 2010, : 479 - 483
  • [3] Implicit Code Obfuscation Technique Based on Code Slice Fusion
    Yu P.
    Shu H.
    Xiong X.-B.
    Kang F.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (04): : 1650 - 1665
  • [4] A Code Encrypt Technique Based on Branch Condition Obfuscation
    Geng P.
    Zhu Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2183 - 2192
  • [5] Technique of Java']Javascript Code Obfuscation Based on Control Flow Tansformations
    Wang Zhiyue
    Wu Weimin
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 391 - 394
  • [6] Stealthy Code Obfuscation Technique for Software Security
    Darwish, Saad M.
    Guirguis, Shawkat K.
    Zalat, Mohamed S.
    ICCES'2010: THE 2010 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2010, : 93 - 99
  • [7] A Code Obfuscation Technique to Prevent Reverse Engineering
    Dalai, Asish Kumar
    Das, Shakya Sundar
    Jena, Sanjay Kumar
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 828 - 832
  • [8] Implementation of Obfuscation Technique on PHP Source Code
    Maskur, Maskur
    Sari, Zamah
    Miftakh, Ahmad Sirojul
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI 2018), 2018, : 738 - 742
  • [9] Technique of Source Code Obfuscation Based on Data Flow and Control FLow Tansformations
    Su Qing
    Wang Zhi-yue
    Wu Wei-min
    Li Jing-liang
    Huang Zhi-wei
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1093 - 1097
  • [10] A SOFTWARE FRAMEWORK FOR CODE SECURITY USING M-COT-METRICS BASED CODE OBFUSCATION TECHNIQUE
    Senthilkumar, R.
    Thangavelu, Arunkumar
    JURNAL TEKNOLOGI, 2016, 78 (02): : 73 - 81