期刊文献+

基于随机插入策略的Java混淆器设计与实现 被引量:3

Design and implementation of Java obfuscator based on random-insert method
下载PDF
导出
摘要 控制流混淆用于混淆程序的运行流程,从而防止对软件的逆向工程,但通常混淆后的程序在代码量以及执行时间方面都有较大增长。提出了随机插入混淆策略,采用分支插入算法和循环条件插入算法相结合,并引入了随机函数以限制代码的插入操作,从而控制代码长度的增长。使用BCEL设计并实现了基于Java字节码的控制流混淆转换工具,能够实现Java字节码的迭代混淆,且混淆结果具有一定的不可再现性。实验结果表明,该策略能够有效地控制混淆转换带来的性能过载,同时能够有效地防止逆向工程攻击。 Control code obfuscation is intended to prevent malicious reverse engineering of software by masking the program control flow. But the file size and execution time often increase intensively. Random-insert method is presented to solve the problem. Branchinsert and loop-insert are used in the method and a random function is introduced here to control the number of insert operation. An obfuscator is implemented using BCEL, which can obfuscate java byte code. Our experiments show that aided with the method, obfuscation is done efficiently with moderate increases in code size, execution times, while making the obfuscated code resilient to a variety of reverse engineering attacks.
作者 宋亚奇 李莉
出处 《计算机工程与设计》 CSCD 北大核心 2009年第4期887-889,892,共4页 Computer Engineering and Design
基金 华北电力大学青年教师科研基金项目(200611040)
关键词 混淆 控制流 随机插入 字节代码 BCEL obfuscation control flow random-insert byte code BCEL
  • 相关文献

参考文献8

  • 1Main A,Oorschot P C.Sottware protection and application security: Understanding the battleground[R]. Heverlee,Belgium:Intemational Course on State of the Art and Evolution of Computer Security and Industrial Cryptography,2003.
  • 2Christian Collberg, Clark Thomborson, Douglas Low. A taxonomy of obfuscating transformations [R]. Department of Com- puter Science,University of Auckland, 1996.
  • 3SONG Ya-qi LI Li.Experiment with control code obfuscation[J].通讯和计算机(中英文版),2007,4(8):59-62. 被引量:2
  • 4Low D.Java control flow obfuscation[D].Department of Computer Science,University of Auckland,1998.
  • 5Tim Lindholm, Frank Yellin,Java virtual machine specification [EB/OL]. http://java.sun.com/docs/books/jvrns/index. html.
  • 6Apache Software Group. BCEL [EB/OL] .http://jakarta.apache. org/bcel/.
  • 7Xavier Leroy.Java bytecode verification: algorithms and formalizations [J]. Journal of Automated Reasoning, 2003,30 (3-4): 235-269.
  • 8Alfred V Aho,Ravi Sethi,Jeffrey D Ullman.Compilers,principles,techniques and tools[M].Addison-Wesley, 1986.

共引文献1

同被引文献12

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部