Technique of Code Obfuscation Based on Class Structure

被引:0
|
作者
Sun Yongyong [1 ]
Huang Guangqiu [1 ]
机构
[1] Xian Univ Architecture & Technol, Sch Management, Xian, Shaanxi, Peoples R China
关键词
code obfuscation; class structure; class aggregation; static analysis; type hidden;
D O I
10.4028/www.scientific.net/AMM.271-272.674
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software protection technology is necessary for software security and property right of software. The algorithm of code obfuscation based on class is proposed that uses of obfuscation technology. The overall architecture of the system is hidden by changing the class diagram for class aggregation, and the algorithm of class aggregation can be used to design class hierarchy in object-oriented program. It makes static analysis difficult while preserving function of program. The interfaces replace original classes to achieve reference in order to implement type hidden, and automatic analysis becomes more difficult.
引用
收藏
页码:674 / 678
页数:5
相关论文
共 50 条
  • [41] Code obfuscation techniques for metamorphic viruses
    Borello, Jean-Marie
    Me, Ludovic
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (03): : 211 - 220
  • [42] A First Look at Code Obfuscation forWebAssembly
    Bhansali, Shrenik
    Aris, Ahmet
    Acar, Abbas
    Oz, Harun
    Uluagac, A. Selcuk
    PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), 2022, : 140 - 145
  • [43] Control code obfuscation by abstract interpretation
    Preda, MD
    Giacobazzi, R
    SEFM 2005: THIRD IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, PROCEEDINGS, 2005, : 301 - 310
  • [44] Security Assessment of Code Obfuscation Based on Dynamic Monitoring in Android Things
    Cho, Taejoo
    Kim, Hyunki
    Yi, Jeong Hyun
    IEEE ACCESS, 2017, 5 : 6361 - 6371
  • [45] ASPECT-ORIENTED CODE OBFUSCATION
    Padayachee, Keshnee
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING, 2009, : 252 - 257
  • [46] Data Hiding Using Code Obfuscation
    Rajba, Pawel
    Mazurczyk, Wojciech
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [47] JHide - A tool kit for code obfuscation
    Department of Mathematics, 25800 Carlos Bee Blvd., Hayward, CA 94542
    Int. Association of Sci. and Technol. for Development, IASTED, 1600, 133-138 (2004):
  • [48] A comparable code obfuscation framework measuring efficiency based on abstract interpretation
    Gao, Ying
    Chen, Yi-Yun
    Jisuanji Xuebao/Chinese Journal of Computers, 2007, 30 (05): : 806 - 814
  • [49] Server-based code obfuscation scheme for APK tamper detection
    Piao, Yuxue
    Jung, Jin-Hyuk
    Yi, Jeong Hyun
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (06) : 457 - 467
  • [50] Zero-knowledge and code obfuscation
    Hada, S
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 443 - 457