2006
DOI: 10.1049/ip-sen:20050010
|View full text |Cite
|
Sign up to set email alerts
|

Three control flow obfuscation methods for Java software

Abstract: Three novel control computation (control flow) obfuscation methods are described for protecting Java class files. They are basic block fission obfuscation, intersecting loop obfuscation and replacing goto obfuscation. The basic block fission obfuscation splits some chosen basic block(s) into more basic blocks, in which opaque predicates and goto instructions are inserted to make decompiling unsuccessful. The intersecting loop obfuscation intersects two loops and then adds this pattern into programs. The inters… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(21 citation statements)
references
References 6 publications
0
19
0
Order By: Relevance
“…Finally, the combination of biometric-secured obfuscated interpretation with other software protection techniques, e.g. control flow obfuscation [23] or opaque constructs [24], will be investigated. It is expected, that these techniques can be easily used together and that a combination will not negatively affect the obfuscated interpretation.…”
Section: Future Workmentioning
confidence: 99%
“…Finally, the combination of biometric-secured obfuscated interpretation with other software protection techniques, e.g. control flow obfuscation [23] or opaque constructs [24], will be investigated. It is expected, that these techniques can be easily used together and that a combination will not negatively affect the obfuscated interpretation.…”
Section: Future Workmentioning
confidence: 99%
“…[5] presents a framework for quantitative analysis of control-flow obfuscating trans-formations by expressing several existing control-flow obfuscation techniques as a sequence of basic transformations of the control-flow graph. [6] describes three control-flow obfuscation methods to protect Java class files, namely basic block fission, intersecting loop and replacing goto. [7] describes a control-flow obfuscation paradigm based on a two-process model where a permutation of static blocks removes control-flow information from the process and stores it in a concurrent process.…”
Section: Related Workmentioning
confidence: 99%
“…The aim of obfuscation is to avoiding MA code analyzed and understood by destination host. Here, control flow obfuscation is used [9]. Control computation Obfuscations hide the real control flow in a program, it is the process of taking a sequence of instructions and forming an equivalent complicated description.…”
Section: Obfuscated Control Flowmentioning
confidence: 99%