期刊文献+

基于AOP的Java混淆代码攻击的研究 被引量:1

Study of AOP-Based Attack for Obfuscated Java Code
下载PDF
导出
摘要 为了研究代码混淆技术的安全性,利用AOP提供的连接点模型和字节码操作机制,提出了一种新的针对混淆代码的攻击方法,其操作均在字节码级别上完成。实验证明,该方法不需要获取目标程序的源代码,从而使代码混淆失去意义;此外,对于攻击者而言,不用对反编译后的程序执行再编译,就可以修改目标代码的行为。与现有的代码混淆技术相比,这种新的攻击方法更加直接且简单易行,是一种行之有效的方法。 In order to study the security of code obfuscation technology,a new attack approach to obfuscated code was proposed using the joint point model and the instrument mechanism provided by AOP.All operations were implemented on byte code level.Experiment showns that the attack approach did not require access to the source code of attack target,which made obfuscation useless.Besides,as for attackers,they could modify the behavior of target application without decompiling and recompiling it.Compared with the existing code obfuscation technology,this attack approach is more straightforward and simpler to be implemented,and is an effective approach.
作者 李媛媛
出处 《太原理工大学学报》 CAS 北大核心 2010年第2期153-156,共4页 Journal of Taiyuan University of Technology
关键词 面向方面编程 混淆 代码攻击 AOP obfuscation code attack
  • 相关文献

参考文献6

  • 1Collberg C, Thomborson C, Low D. Breaking Abstractions and Unstructuring Data Structures[C]. IEEE Int'l Conf Computer Languages, 1998.
  • 2.ow D. Java Control Flow Obfuscation[D]. Auckland:University of Auckland, 1998.
  • 3Wang C. A Security Architecture for Survivability Mechanisms[D]. Charlattesville: Univ of Virginia,2000.
  • 4Alex Kalinovsky.透视Java:反编译、修补和逆向工程技术[M].刘凌译.北京:清华大学出版社,2005.
  • 5Udupa S K,Debray S K, Madou M. Deobfuscation: Reverse Engineering Obfuscated Code[C]// Proceedings of the 12th Working Conference on Reverse Engineering. Los Alamitos:IEEE Computer Society, 2005:45-54.
  • 6Kiczales G, Lamping J. Aspect-Oriented Programming[C]//Proceedings of the European Conference on Object-Oriented Programming (ECOOP). Finland : Springer Verlag, 1997 : 220-242.

同被引文献10

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部