期刊文献+

软件开发中的一个重要环节———混淆 被引量:7

An Important Step in Software Development——Obfuscation
下载PDF
导出
摘要 详细阐述了混淆在软件开发中的重要作用,并讨论了4种需要混淆代码的情形以及常见的混淆方法。在此基础上着重分析了Java字节码的特点,并列举了几种典型的Java字节码混淆器,具体介绍了RetroGuard混淆器的特点和用法。 This paper gives an introduction to the importance of obfuscating in software development. Java bytecode, .NET CIL, Email Address and Flash ActionScript all need obfuscating. We discussed some commonly used obfuscating methods in this paper. Emphasis is placed on the analysis of the features of Java bytecode. Some typical obfuscators are listed, and the feature of RetroGuard obfuscator is introduced in detail.
出处 《南京邮电学院学报(自然科学版)》 2004年第1期59-63,共5页 Journal of Nanjing University of Posts and Telecommunications
关键词 软件开发 混淆代码 JAVA字节码 RetroGuard混淆器 工作环境 Java bytecode Decompile Obfuscate RetroGuard obfuscator
  • 相关文献

参考文献9

  • 1CodingArt^TM.CodeShield混淆器[EB/OL].http://www.codingart.com/codeshield.html,.
  • 2DIANAPrince.Decafe反编译器[EB/OL].http://soft.winzheng.com/SoftView/SoftView_12663.htm,.
  • 3胡宪利.如何有效的保护JAVA程序[EB/OL].http://www-900.ibm com/developerWorks/cn/java/1-protectjava/index.shtml,.
  • 4蔡学镛.Java相关的编译技术[EB/OL].http://www.mhdn.net/p/2002—10474/6023.html,.
  • 5XenoCode.NET混淆优化器[EB/OL].http://www.xenoeode.com./cn,.
  • 6GenableLab.ActionScript混淆器(ASO)[EB/OL].http://www.genable.com/aso,.
  • 7CodeHousetom.E—mail混淆器[EB/OL].http://www.codehouse.com/webmaster—tools/email—obfuscator,.
  • 8RetroLogic^TM.RetroGuard混淆器[EB/OL].http://www.retrologic.com/retroguard-download html,.
  • 9Eastrige^TM.Jshrink混淆器[EB/OL].http://www.e-t.com/jshrink.html,.

共引文献1

同被引文献164

  • 1史扬,曹立明,王小平.Java混淆器的设计与实现[J].计算机应用,2004,24(11):63-65. 被引量:5
  • 2史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报(自然科学版),2005,33(6):813-819. 被引量:12
  • 3Collberg C,Thomborson C,Low D.A taxonomy of obfuscating transformations[R].Auckland:Department of Computer Science,University of Auckland,1997.
  • 4Collberg C.Watermarking,tamper2proofing and obfuscation tools for software protection[J].IEEE Transactions on Software Engineering,2002,28(8):735-746.
  • 5Collberg C,Thomborson C,Low D.Manufacturing cheap,resilient,and stealthy opaque constructs[C]//Proceedings of the 25th ACM Sigplan2Sigact symposium on Principles of Programming Languages.New York:ACM Press,1998:184-196.
  • 6Collberg C,Thomborson c,Low D.Breaking abstractions and unstructuring data structures[C]//Procceedings of IEEE International Conference on Computer Languages.[S.L.]:IEEE Computer Society Press,1998:28-38.
  • 7Collberg C,Thomborson C.Software watermarking:Models and dynamic embeddings[C]//Proceedings of Symposi-um on Principles of Programming Languages.New York:ACM Press,1999:311-324.
  • 8Collberg C.CS620 security through obscurity[EB/OL].http://www.cs.arizona.edu/collberg/Teaching/SoftwareSecurity.html.
  • 9Collberg C,Myles G,Huntwork A.Sandmark-a tool for software protection research[J].IEEE Security and Privacy,2003,1(4):40-49.
  • 10Hou T W,Chen H Y,Tsai M H.Three Control flow obfus-cation metheds for Java software[C]//The Institution of Engineering and Technology,2006,IEEE Proceedings online NO.20050010.

引证文献7

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部