2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC) 2009
DOI: 10.1109/icicic.2009.312
|View full text |Cite
|
Sign up to set email alerts
|

Research on Java Software Protection with the Obfuscation in Identifier Renaming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…In high-level diversification, identifier renaming is often a technique used to confuse the de-compiler so that it is no longer able to generate correct code out of the obfuscated code, or to make the produced code contain syntax errors or semantic errors [20]. In [18], the authors obfuscate the Java byte code through identifier renaming in order to protect the Java-based mobile agents.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In high-level diversification, identifier renaming is often a technique used to confuse the de-compiler so that it is no longer able to generate correct code out of the obfuscated code, or to make the produced code contain syntax errors or semantic errors [20]. In [18], the authors obfuscate the Java byte code through identifier renaming in order to protect the Java-based mobile agents.…”
Section: Related Workmentioning
confidence: 99%
“…Linger et al [11] propose the stochastic renaming of the data and labels (altering the names using the strings generated randomly) as a method of diversification. In [20] four different identifier renaming algorithms are presented to obfuscate the Java source code to generate hard-to-analyze scrambled Java byte code. In [5], identifier renaming is used to mitigate the risk of a successful attack, e.g., SQL injection, cross-site scripting (XSS), and buffer overflow.…”
Section: Related Workmentioning
confidence: 99%
“…This method entails modifying elements like whitespace, indentation, and comments, which are crucial for human readability but irrelevant to machine execution of the code. Scramble Identifiers [33,40], Change Formatting [41], and Remove Comments [41] techniques are types of layout obfuscation that eliminate existing information from the source code. Layout obfuscation, achieved by rearranging, adding, or removing non-executable components, renders source code a challenge to read and understand, particularly for individuals attempting to reverse engineer or maliciously analyze it.…”
Section: Source Code Obfuscationmentioning
confidence: 99%
“…• Hiding [20] This technique emphasizes to hide features and change the layout. This is harder to understand but is not impossible to reverse.…”
Section: List Limitationmentioning
confidence: 99%