Technique of Code Obfuscation Based on Class Structure

被引:0
|
作者
Sun Yongyong [1 ]
Huang Guangqiu [1 ]
机构
[1] Xian Univ Architecture & Technol, Sch Management, Xian, Shaanxi, Peoples R China
关键词
code obfuscation; class structure; class aggregation; static analysis; type hidden;
D O I
10.4028/www.scientific.net/AMM.271-272.674
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software protection technology is necessary for software security and property right of software. The algorithm of code obfuscation based on class is proposed that uses of obfuscation technology. The overall architecture of the system is hidden by changing the class diagram for class aggregation, and the algorithm of class aggregation can be used to design class hierarchy in object-oriented program. It makes static analysis difficult while preserving function of program. The interfaces replace original classes to achieve reference in order to implement type hidden, and automatic analysis becomes more difficult.
引用
收藏
页码:674 / 678
页数:5
相关论文
共 50 条
  • [21] Research on deformation based binary code obfuscation technology
    Wang, Huai-Jun
    Fang, Ding-Yi
    Li, Guang-Hui
    Zhang, Cong
    Jiang, He
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (01): : 14 - 21
  • [22] Trust Evaluation Method Based on the Degree of Code Obfuscation
    Chen, Lu
    Dai, Zaojian
    Li, Nige
    Li, Yong
    SMART COMPUTING AND COMMUNICATION, 2022, 13202 : 164 - 174
  • [23] Research on Code Obfuscation Based on Maze Protection Technology
    Wang, Zhiyue
    Wu, Weimin
    Ma, Wenrui
    Li, Jinliang
    Huang, Zhiwei
    MECHATRONICS, ROBOTICS AND AUTOMATION, PTS 1-3, 2013, 373-375 : 1691 - +
  • [24] Semantics-based code obfuscation by abstract interpretation
    Dalla Preda, Mila
    Giacobazzi, Roberto
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (06) : 855 - 908
  • [25] Obfuscation Code Localization Based on CFG Generation of Malware
    Nguyen Minh Hai
    Ogawa, Mizuhito
    Quan Thanh Tho
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 229 - 247
  • [26] A code obfuscation framework using code clones
    Kulkarni, Aniket
    Metta, Ravindra
    22nd International Conference on Program Comprehension, ICPC 2014 - Proceedings, 2014, : 295 - 299
  • [27] An innovative algorithm for code Obfuscation
    Muhammad, Aslam
    Zia-ul Qayyum
    Ashfaq, Ahmad
    Waqar, M. M.
    Martinez-Enriquez, A. M.
    Syed, Afraz Z.
    LIFE SCIENCE JOURNAL-ACTA ZHENGZHOU UNIVERSITY OVERSEAS EDITION, 2012, 9 (01): : 527 - 533
  • [28] A Study & Review on Code Obfuscation
    Sebastian, Savio Antony
    Malgaonkar, Saurabh
    Shah, Paulami
    Kapoor, Mudit
    Parekhji, Tanay
    2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,
  • [29] Genetic Improvement for Code Obfuscation
    Petke, Justyna
    PROCEEDINGS OF THE 2016 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'16 COMPANION), 2016, : 1135 - 1136
  • [30] COOPS: A Code Obfuscation Method Based on Obscuring Program Semantics
    Li, Yang
    Kang, Fei
    Shu, Hui
    Xiong, Xiaobing
    Sha, Zihan
    Sui, Zhonghang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022