Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2004
DOI: 10.1016/s0164-1212(02)00066-3
|View full text |Cite
|
Sign up to set email alerts
|

Advanced obfuscation techniques for Java bytecode

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 62 publications
(42 citation statements)
references
References 3 publications
0
39
0
Order By: Relevance
“…In addition to the analysis of permissions, our program detects the use of Java reflection, and dynamic class-loading. These behaviors can help to obfuscate the behavior of the program [7].…”
Section: Analysis Methodologymentioning
confidence: 99%
“…In addition to the analysis of permissions, our program detects the use of Java reflection, and dynamic class-loading. These behaviors can help to obfuscate the behavior of the program [7].…”
Section: Analysis Methodologymentioning
confidence: 99%
“…If we have to complicate this reverse engineering process with respect to Java applets, then the bytecodes of Java applets can be obfuscated [6] using various tools [17].…”
Section: Chapter 4 Code Obfuscationmentioning
confidence: 99%
“…Chan et al suggested overusing an identifier to improve Java layout obfuscation based on substituting the identifiers with meaningless names [21] Xu et al applied whitespace randomization, comments randomization, and variable and function names randomization to JavaScript [22], these methods were all for source codetransformation.…”
Section: Related Workmentioning
confidence: 99%