期刊文献+

Java程序混淆技术综述 被引量:15

A Survey on Java Program Obfuscation Techniques
下载PDF
导出
摘要 软件混淆技术已经广泛应用于抵制逆向工程和重组工程.文中从混淆技术的历史发展角度对现有的混淆技术理论、算法、攻击模式和评估进行了综述,将Java程序混淆算法分为类内混淆和类间混淆两个类别,并对其中的各类算法进行详尽的阐释.最后在现有工作的基础上,展望了软件混淆技术未来的发展与研究方向. Obfuscation techniques have been widely and re-engineering attacks. From the view of the applied in the defenses of reverse engineering development of obfuscation, we briefly discussed the principles, algorithms, different kinds of attack approaches and evaluating standard. Java program obfuscation algorithms can be divided into two types: One is obfuscation within a class; the other is obfuscation between classes. Finally, based on the survey of these obfuscation techniques, the future research of Java program obfuscation is also stated.
出处 《计算机学报》 EI CSCD 北大核心 2011年第9期1578-1588,共11页 Chinese Journal of Computers
基金 国家自然科学基金(61073005 60803016) 国家"九七三"重点基础研究发展规划项目基金(2009CB320706) 国家"八六三"高技术研究发展计划项目基金(2009AA043401) 清华信息科学与技术重点实验室学科交叉基金项目资助~~
关键词 程序混淆 软件水印 防篡改 软件版权保护 obfuscation software watermark, temp-proofing software copyright protection
  • 相关文献

参考文献39

  • 1Van V H. Mocha, the Java Decompiler. http://www, brou haha. com/-eric/so{tware/mocha/, 1996.
  • 2Collberg C, Thomborson C, Low D. A Taxonomy of Obfus- cating Transformations. Department of Computer Science, University of Auckland: Technical Report 10, 1997.
  • 3Sosonkin M, Naumovich G, Memon N. Obfuscation of de sign intent in object oriented applieations//Proceedings of the Digital Rights Management Workshop. Washington, DC, USA, 2003:142 -153.
  • 4Chan J T, Yang W. Advanced obfuscation techniques for Java bytecode. Journal of Systems and Software, 2004, 71(1 2): 1-10.
  • 5De A R, Van L O. Stealthy obfuscation techniques: Mislead- ing the pirates. Department of Computer Science University of Twente Enschede, The Netherlands, 2003.
  • 6Majumdar A, Thomborson C. Manufacturing opaque predi cates in distributed systems for code obfuscation//Proceed ings of the 4th International Conference on Information Secu rity. Hobart, Tasmania, Australia, 2006:187-196.
  • 7Wang C, Hill J, Knight J et al. Software tamper resistance: Obstructing static analysis of programs. University of Vir- ginia: Technical Report CS-2000- 12, 2000.
  • 8Chow S, Gu Y, Johnson Het al. An Approach to the Obfus cation of Control-Flow of Sequential Computer Programs// Proceedings of the 4th International Conference on Informa- tion. Malaga, Spain, 2001:144-155.
  • 9Low D. Java Control Flow Obfuscation[M. S. dissertation]. University of Auckland, 1998.
  • 10Drape S, Majumdar A, Thomborson C. Slicing aided design of obfuscating transforms//Proeeedings of the International Computing and Information Systems Conference (ICIS 2007). Melbourne, Australia, 2007:1019-1024.

二级参考文献8

  • 1[1]Cohen F B. Operating system protection throughprogram evolution.Computers and Security, 1993; 12(6):565-584
  • 2[2]Collberg C, Thomborson C. Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Computer Society,2002; 28(8):735-746
  • 3[3]Kanzaki Y, Monden A, Nakamura M, Matsumoto K. Exploiting selfmodification mechanism for program rotection. Proc 27th IEEE Computer Software ApplicationsConference(compsae2003) , Dallas,USA: 2003:170- 179
  • 4[4]Sander T, Tschudin C F. Protecting mobile agents against malicious hosts. Lecture Notes in Computer Science, 1998;1419:44-60
  • 5[5]Barrantes E G, Ackley D H, Forrest S, Palmer T S, Stefanovic D,Zovi D D. Randomized instruction set emulation to disrupt binary code injection attacks. Proc 10th ACM Conference on Computer and Communications Security (CCS2003), 2003;281-289
  • 6[6]Kc G S, Keromytis A D, Prevelakis V. Countering code-injection attacks with instruction-set randomization. Proc 10th ACM Conference on Computer and Communications Security (CCS2003), Washington DC, USA. 2003 ;272-280
  • 7[7]Hogan J, Montague P, Purvis M, Steketee C, A Framework for obfuscated interpretation. Conferences in Research and Practice in Information Technology, Dunedin, New Zealand: 2004:32
  • 8[8]Monden A, Hajimu L, Matsumoto K I, Inoue K, Torii K.Watermarking java programs. In: Lu J, et aleds. Proceedings of the 4th International Symposium on Future Software Technology. Nanjing: Software Engineers Association, 1999;119- 124

共引文献3

同被引文献109

引证文献15

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部