期刊文献+

基于程序设计类图保护的代码迷惑算法

Code Obfuscation Algorithm Based on Protecting Program Design Class Diagram
下载PDF
导出
摘要 通过反向工程可以较容易获得Java程序代码的设计类图,从而给保护软件知识产权带来困难。为此,采用Java接口融合的代码迷惑方法,提出一种保护Java程序设计类图的代码迷惑算法,并根据该算法构造一种Java接口融合迷惑器。实验结果表明,该算法具有较好的迷惑效果,有效地隐藏程序的设计类图,并且没有额外时间消耗和大量冗余代码。 It is easy to get the design class diagram in Java application by applying reverse engineering, which makes it difficult to protect software intellectual property. This paper presents the code obfuscation techniques of protecting program design class diagram in Java application by applying the interface coalescing, and constructs a Java interface coalescing obfuscator. Experimental results show that the designed obfuscator obtains better effect of code obfuscation and hides efficiently the program class diagram, and it has not the extra execution time and lots of redundant code.
出处 《计算机工程》 CAS CSCD 2012年第14期44-47,共4页 Computer Engineering
基金 广西自然科学基金资助项目(2011GXNSFA018152) 广西科学研究与技术开发计划基金资助项目(桂科攻10124001A-48) 广西研究生教育创新计划基金资助项目(GXU11T32553)
关键词 代码迷惑 接口融合 设计类图 反向工程 迷惑范围 迷惑器 code obfuscation interface coalescing design class diagram reverse engineering obfuscation scope obfuscator
  • 相关文献

参考文献10

  • 1Collerg C, Thomborson C, Low D. A Taxonomy of Obfuscation Transformations[R]. Auckland, New Zealand: University of Auckland, Tech. Rcp.: 148, 1997.
  • 2朱正平,钟诚,陈东用.一种基于执行路径隐藏的软件水印算法[J].计算机应用研究,2006,23(12):118-120. 被引量:3
  • 3李永祥,陈意云.基于函数指针数组的代码迷惑技术[J].计算机学报,2004,27(12):1706-1711. 被引量:14
  • 4刘九,林孔升,尚汪洋,蔡德霞.基于Java多线程隐藏数组下标变换表达式的代码迷惑算法[J].广西科学院学报,2010,26(4):420-422. 被引量:1
  • 5卿海军,钟诚,张莲.基于源代码植入的针对函数指针的反代码迷糊[C]//2007年计算机技术与应用进展会议论文集.合肥:中国科学技术大学出版社,2007.
  • 6钟诚,朱正平,张莲,等.一种基于程序切片的反代码迷惑算法[C]//2007年计算机技术与应用进展会议论文集.合肥:中国科学技术大学出版社,2007.
  • 7Chan Jicn Tsai, Yang Wuu Chan. Advanced Obfuscation Tech- niques for Java Bytecode[J]. Journal of Systems and Software, 2004, 71(1/2): 1-10.
  • 8Zhang Xuesong, He Fengling, Zuo Wanli. An Inter-classes Obfuscation Method for Java Program[C]//Proceedings of 2008 International Conference on Information Security and Assurance. [S. 1.]: IEEE Press, 2008: 360-365.
  • 9Sosonkn M, Naumovich G, Memon N. Obfuscation of Design Intent in Object-oriented Applications[C]//Proceedings of ACM Workshop on Digital Right Management. New York, USA: ACM Press, 2003: 142-153.
  • 10Tang Zhangyong, Chen Xiaojiang, Fang Dingyi, et al. Research on Java Software Protection with the Obfuscation in Identifier Renaming[C]//Proceedings of the 4th International Conference on Innovative Computing, Information and Control. Washington D. C., USA: IEEE Computer Society, 2009: 1067- 1071.

二级参考文献30

  • 1李永祥,陈意云.基于函数指针数组的代码迷惑技术[J].计算机学报,2004,27(12):1706-1711. 被引量:14
  • 2Collerberg Christian,Clark Thomborson,Doug Laslow.A taxonomy of obfuscating transformations[R].New Zealan:Department of Computer Science,the University of Auckland,1997:148.
  • 3Smiths.Secure coprocessing applications and research issues,LAUR-96-2805[R].Los Alamos:Los Alamos National Laboratory,1996.
  • 4Boaz Barak,Oded Goldreich,Rusell Impagliazzo,et al.On the (Im)possibility of obfuscating programs:proceedings of the 21st Annual International Cryptology Conference on Advancess in Craytology 2001,Santa Barbara,California[C].[S.l.]:[s.n.],2001:19-23.
  • 5Zhang Xuesong,He Fengling,Zuo Wanli.An inter-classes obfuscation method for Java program:proceedings of the 2008 International Conference on Information Security and Assurance,April 24-26,2008,Busan,Korea[C].[S.l.]:[s.n.],2008:360-365.
  • 6卿海军,钟诚,张莲.基于源代码植入的针对函数指针数组的反代码迷惑:2008计算机技术与应用进展[C].合肥:中国科学技术大学出版社,2008:1095-1099.
  • 7Colllberg C., Thomborson C., Low D.. A taxonomy of obfuscating transformations. Department of Computer Science, the University of Auckland: Technical Report #148, 1996
  • 8Burke M., Carini P. R., Choi Jong-Deok. Interprocdural pointer alias analysis. IBM Research Report: RC21055, 1997
  • 9Karnik N.M., Tripathi A.R.. Security in the ajanta system. Software-Practice and Experience, 2000, 30(1): 1~29
  • 10Ghiya R.. Interprocedural analysis in the presence of function pointers. McGill University, Montreal, Quebec, Canada, ACAPS Technical Report: 62,1992

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部