期刊文献+

Java标识符重命名混淆算法及其实现 被引量:5

Java Identifier Renaming Obfuscation Algorithms and Their Implementation
下载PDF
导出
摘要 针对控制流混淆和数据混淆会引入额外开销的问题,提出4种标识符重命名算法,包括滥用标识符算法、重载无关联方法算法、非法标识符代替合法标识符算法以及重写静态方法算法,以这4种算法为核心技术构造Java混淆器JIRO,对JIRO的性能进行初步分析,结果表明,JIRO具有较好的混淆效果,不会引入额外的字节码执行开销。 Aiming at the problem that it will cause extra costs when introducing control flow obfuscation and data obfuscation, this paper presents four renaming algorithms including overusing identifiers algorithm, overloading unrelated method algorithm, introducing illegal identifiers algorithm and overriding static methods algorithm. An obfuscator named JIRO(Java Identifier Renaming Obfuscator) is constructed based on the algorithms, and its performance is analyzed. The results show that JIRO achieves good obfuscation effects without extra implementation costs of the bytecode.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第1期146-148,共3页 Computer Engineering
基金 国家博士后基金资助项目(20070410381) 陕西省教育厅专项基金资助项目(08JK447)
关键词 代码混淆 标识符重命名 混淆器 code obfuscation identifier renaming obfuscator
  • 相关文献

参考文献4

  • 1Collberg C, Thomborson C, Low D. A Taxonomy of Obfuscating Transformations[R]. Auckland, New Zealand: University of Auckland, Tech. Rept.: 148, 1997.
  • 2Cimato S, De Santis A, Petrillo U F. Overcoming the Obfuscation of Java Programs by Identifier Renaming[J]. Journal of Systems and Software, 2005, 78(1): 60-72.
  • 3Chan Jien-Tsai, Yang Wuu. Advanced Obfuscation Techniques for Java Bytecode[J]. Journal of Systems and Software, 2004, 71(1/2): 1-10.
  • 4Gosling J J, Steele B, Bracha G G. The Java Specification[M]. 2nd ed. [S. l.]: Addison-Wesley, 2000.

同被引文献40

  • 1史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报(自然科学版),2005,33(6):813-819. 被引量:12
  • 2严蔚敏,吴伟民.数据结构(C语言版)[M].北京:清华大学出版社.2011.
  • 3袁征,冯雁,温巧燕,张华.构造一种新的混淆Java程序的不透明谓词[J].北京邮电大学学报,2007,30(6):103-106. 被引量:9
  • 4Jamie Jaworski. Java Security Hanclbook[M].北京:电子工业出版社,2001.
  • 5Waiter Savitch. Java: An Introduction to Computer Science and Programming[M]. Second Edition. Upper Saddle River: Prentice Hall, 2000.
  • 6Greg Travis. How to Lock Down Your Java Code[R]. IBM: Developer Works,2001.
  • 7Sun Microsystems. Java Cryptography Extension[EB/OL]. http://java, sun. corn/products/ice/index, html.
  • 8Wang Chenxi.A security architecture for survivability mechanisms[D].Virginia:University of Virginia,2001.
  • 9Collberg C,Thomborson C,Low D.A taxonomy of obfuscating transformations[R].New Zealand:Department of Computer Science,University of Auckland,1997:1-36.
  • 10Collberg C,Thomborson C,Low D.Manufacturing cheap,resilient,and stealthy opaque constructs[C]//Proc of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.New York:ACM Press,1998:184-196.

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部