In this paper we propose novel techniques to obfuscate Java programs for developing secure mobile agent systems. Our obfuscation techniques take advantage of polymorphism and exception mechanism of object-oriented languages and can drastically reduce the precision of points-to analysis of the programs. We show that determining precise points-to analysis in obfuscated programs is NP-hard and the fact provides a theoretical basis for our obfuscation techniques. Furthermore, in this paper we present some empirical experiments, whereby we demonstrate the effectiveness of our approaches.Communications and multimedia security : advanced techniques for network and data protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Ital...
Bytecode, Java’s binary form, is relatively high-level and therefore susceptible to decompilation at...
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious ...
Obfuscation is a very common protection against reverse engineering attacks: it modifies a program ...
In Java programs, it is difficult to protect intellectual property rights and secret information in ...
To protect valuable assets embedded in software against reverse-engineering attacks, software obfusc...
To ensure platform independence, mobile programs are distributed in forms that are isomorphic to the...
This document describes our investigation into software obfuscation for building Self-Protecting Mob...
Java is the predominant language for mobile agent systems, both for implementing mobile agent execut...
AbstractCode obfuscation was introduced as a viable technique to prevent reverse engineering of soft...
In general, Java bytecode programs can be decompiled into source code. From the standpoint of protec...
In this paper we discuss security in mobile object systems. Mobile object systems embody a paradigm ...
With a market share of 86%, Android is the most common operating system on mobile devices[6]. On the...
ode obfuscation is a popular approach to turn program comprehension and analysis harder, with the ai...
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious ...
International audienceObfuscation techniques help developers to hide their code when distributing an...
Bytecode, Java’s binary form, is relatively high-level and therefore susceptible to decompilation at...
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious ...
Obfuscation is a very common protection against reverse engineering attacks: it modifies a program ...
In Java programs, it is difficult to protect intellectual property rights and secret information in ...
To protect valuable assets embedded in software against reverse-engineering attacks, software obfusc...
To ensure platform independence, mobile programs are distributed in forms that are isomorphic to the...
This document describes our investigation into software obfuscation for building Self-Protecting Mob...
Java is the predominant language for mobile agent systems, both for implementing mobile agent execut...
AbstractCode obfuscation was introduced as a viable technique to prevent reverse engineering of soft...
In general, Java bytecode programs can be decompiled into source code. From the standpoint of protec...
In this paper we discuss security in mobile object systems. Mobile object systems embody a paradigm ...
With a market share of 86%, Android is the most common operating system on mobile devices[6]. On the...
ode obfuscation is a popular approach to turn program comprehension and analysis harder, with the ai...
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious ...
International audienceObfuscation techniques help developers to hide their code when distributing an...
Bytecode, Java’s binary form, is relatively high-level and therefore susceptible to decompilation at...
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious ...
Obfuscation is a very common protection against reverse engineering attacks: it modifies a program ...