Papers

2003

Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods

Proceedings of the IASTED International Conference on Communication, Network, and Information Security
  • Kazuhide Fukushima
  • ,
  • Toshihiro Tabata
  • ,
  • Kouichi Sakurai

First page
108
Last page
113
Language
Publishing type
Research paper (international conference proceedings)

Recently, Java has been spread widely. However, Java has a problem that an attacker can reconstruct Java source codes from Java classfiles. Therefore many techniques for protecting Java software have been proposed, but, quantitive security evaluations are not fully given. This paper proposes an obfuscation scheme for Java source codes by destructing the encapsulation. In addition, we propose an evaluation scheme on the number of accesses to the fields and the methods of the other classes. We try to realize tamper-resistant software with the certain quantitive basis of security using our evaluation.

Link information
J-GLOBAL
https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902211011030483
Scopus
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=2642513151&origin=inward
Scopus Citedby
https://www.scopus.com/inward/citedby.uri?partnerID=HzOxMe3b&scp=2642513151&origin=inward
ID information
  • ISBN : 0889864020
  • J-Global ID : 201902211011030483
  • SCOPUS ID : 2642513151

Export
BibTeX RIS