期刊文献+

软件保护利器——混淆算法研究

Software Protector-Research of Obfuscating Algorithms
下载PDF
导出
摘要 文章介绍了混淆算法的力量、弹性、执行代价和隐蔽性等性能及其度量,简要叙述了各种混淆变换,总结了反混淆和对混淆算法的攻击方法,提出了若干可能的研究方向。 Measures of potency, resilience, execution cost and stealth are introduced at the beginning. Then a synopsis and a review of obfuscating transformations are given. Furthermore, attacks against obfuscating algorithms and deobfuscation are summarized. Some suggestions about future work are proposed in the end.
作者 卜峰
出处 《电脑与信息技术》 2008年第1期46-48,53,共4页 Computer and Information Technology
关键词 混淆变换 移动代码保护 知识产权保护 obfuscating transformations mobile code protection intellectual property protection
  • 相关文献

参考文献23

  • 1Collberg C , Thomborson C ,Low D. A taxonomy of obfuscating trans formations [R] . Auckland : Department of Computer Science, University of Auckland, 1997.
  • 2Collberg C. Watermarking ,tamper2proofing and obfuscation tools for software protection[J] . IEEE Transactions on Software Engineering, 2002,28 (8) :735 - 746.
  • 3Lake A ,Cook C. Use of factor analysis to develop OOP software complexity metrics[A] . Proceedings of Sixth Ann Oregon Workshop Software Metrics[C] . Oregon :Silver Falls ,1994.1 - 15.
  • 4Munson J , Kohshgoftar T. Measurement of data structure complexity [J] . Journal of Systems Software ,1993,20:217 - 225.
  • 5Chidamber S , Kemerer C. Ametrics suite for object oriented design [J]. IEEE Transactions on Software Engineering 3994,20(6):476 - 493.
  • 6Collberg C , Thomborson C ,Low D. Manufacturing cheap , resilient, and stealthy opaque constructs [A] . Proceedings of the 25th ACM Sigplan2Sigact symposium on Principles of Programming Languages [C]New York :ACM Press ,1998. 184 - 196.
  • 7Lindholm T , Yellin F. The Java virtual machine specification[M] . New York :Addison2Wesley ,1997.
  • 8Retrologic. RetroGuard for Java [EB/OL] . http ://www. retrologic. corn/retroguard2main.html.2004 - 02 - 10.
  • 9ProGuard. ProGuard [EB/ OL] . http :/ / proguard. sourceforge.net . 2003 - 06 - 12.
  • 10金蝶软件..Java混淆编译器[EB/OL]..http://www.cn2java.com/target/news,,..

二级参考文献15

  • 1[1]COLLBERG C,THOMBORSON C,LOW D.A Taxonomy of Obfuscating Transformations[ R].Technical Report 148,Department of Computer Science,University of Auckland,July 1997.
  • 2[2]HOHL F.Time Limited Blackbox Security:Protecting Mobile Agents from Malicious Hosts,Mobile Agents and Security[ J].Lecture Notes in Computer Science,Springer-Verlag,1998,1491:92-113.
  • 3[3]COLLBERG CS.Watermarking,Tamper-Proofing,and obfuscation Tools for Software Protection[J].IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,2002,28( 8).
  • 4[4]SANDER T,TSCHUDIN CF.Protecting Mobile Agents Against Malicious Hosts,Mobile Agents and Security[J].Lecture Notes in Computer Science,Springer-Verlag,1998,1419:44-60.
  • 5[5]LINDHOLM T,YELLIN F.The Java Virtual Machine Specification 2ed[ M].USA:Addison-Wesley,1999.
  • 6[6]MCMANIS C.Take a look inside Java classes [ EB / OL ].http:∥www.javaworld.com/javaworld/jw-08-1997/jw-08-indepth.html,1997.
  • 7CodingArt^TM.CodeShield混淆器[EB/OL].http://www.codingart.com/codeshield.html,.
  • 8DIANAPrince.Decafe反编译器[EB/OL].http://soft.winzheng.com/SoftView/SoftView_12663.htm,.
  • 9胡宪利.如何有效的保护JAVA程序[EB/OL].http://www-900.ibm com/developerWorks/cn/java/1-protectjava/index.shtml,.
  • 10蔡学镛.Java相关的编译技术[EB/OL].http://www.mhdn.net/p/2002—10474/6023.html,.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部