Technique of Java']Javascript Code Obfuscation Based on Control Flow Tansformations

被引:3
|
作者
Wang Zhiyue [1 ]
Wu Weimin [1 ]
机构
[1] Guangdong Univ Technol, Fac Comp, Guangzhou 510006, Guangdong, Peoples R China
来源
关键词
Control flow tansformations; !text type='Java']Java[!/text]script code; Opaque predicates; Control-flow flattening;
D O I
10.4028/www.scientific.net/AMM.519-520.391
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of scripting language, javascript has been widely used in the application and web development industry. One of the main disadvantages of javascript for developers of commercial applications is the ease by which customers and competitors can study, analyze, and reuse the source code. Therefore, this paper proposes a technique of javascript code obfuscation based on control flow tansformations. The experimental results prove that, its effective protect javascript source code.
引用
收藏
页码:391 / 394
页数:4
相关论文
共 50 条
  • [1] Technique of Source Code Obfuscation Based on Data Flow and Control FLow Tansformations
    Su Qing
    Wang Zhi-yue
    Wu Wei-min
    Li Jing-liang
    Huang Zhi-wei
    [J]. PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1093 - 1097
  • [2] The Power of Obfuscation Techniques in Malicious Java']JavaScript Code: A Measurement Study
    Xu, Wei
    Zhang, Fangfang
    Zhu, Sencun
    [J]. PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2012, : 9 - 16
  • [3] Optimizing Away Java']JavaScript Obfuscation
    Herrera, Adrian
    [J]. 2020 20TH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM 2020), 2020, : 215 - 220
  • [4] A Method of Java']JavaScript path obfuscation based on Collatz conjecture
    Qin, Shukai
    Wang, Zhenyu
    Wang, Yonghong
    Xu, Kaijie
    [J]. 2015 12TH WEB INFORMATION SYSTEM AND APPLICATION CONFERENCE (WISA), 2015, : 330 - 333
  • [5] JS']JSOD: Java']JavaScript obfuscation detector
    AL-Taharwa, Ismail Adel
    Lee, Hahn-Ming
    Jeng, Albert B.
    Wu, Kuo-Ping
    Ho, Cheng-Seen
    Chen, Shyi-Ming
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1092 - 1107
  • [6] AN OPTIMIZATION METHOD OF JAVA']JAVASCRIPT REDUNDANT CODE ELIMINATION BASED ON HYBRID ANALYSIS TECHNIQUE
    Gao Qiong
    Li Wenmin
    [J]. 2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 300 - 305
  • [7] Three control flow obfuscation methods for Java']Java software
    Hou, T. W.
    Chen, H. Y.
    Tsai, M. H.
    [J]. IEE PROCEEDINGS-SOFTWARE, 2006, 153 (02): : 80 - 86
  • [8] Java']JavaScript Code Suggestion Based on Deep Learning
    Zhong, Chaoliang
    Yang, Ming
    Sun, Jun
    [J]. 3RD INTERNATIONAL CONFERENCE ON INNOVATION IN ARTIFICIAL INTELLIGENCE (ICIAI 2019), 2019, : 145 - 149
  • [9] A large study on the effect of code obfuscation on the quality of java']java code
    Ceccato, Mariano
    Capiluppi, Andrea
    Falcarin, Paolo
    Boldyreff, Cornelia
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2015, 20 (06) : 1486 - 1524
  • [10] Technique of Code Obfuscation Based on Class Structure
    Sun Yongyong
    Huang Guangqiu
    [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE III, PTS 1 AND 2, 2013, 271-272 : 674 - 678