完整後設資料紀錄
DC 欄位語言
dc.contributor.authorTsai, Ming-Hsiu
dc.contributor.authorChen, Hsiang-Yang
dc.contributor.authorHou, Ting-Wei
dc.date.accessioned2009-06-02T06:40:30Z
dc.date.accessioned2020-05-25T06:42:20Z-
dc.date.available2009-06-02T06:40:30Z
dc.date.available2020-05-25T06:42:20Z-
dc.date.issued2006-10-13T01:20:53Z
dc.date.submitted2004-12-15
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/1117-
dc.description.abstractA defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. Our goal is to let all known decompilation techniques fail to decompile Java programs and lower the re-engineering level to assembly language (bytecode). We design three new obfuscation methods for protecting Java code. Our new designed techniques are named as “destroying basic block obfuscation”, “replacing goto obfuscation” and “intersecting loop obfuscation”. We use 16 different available decompliers to examine and compare our obfuscations. As the result, both the “replacing goto obfuscation” and the “intersecting loop obfuscation” could succeed to defeat all the decompilers.
dc.description.sponsorship大同大學,台北市
dc.format.extent7p.
dc.format.extent623368 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2004 ICS會議
dc.subjectreverse engineering attacks
dc.subjectobfuscation
dc.subjectJAVA
dc.subjectdecompiler
dc.subject.otherInformation Security
dc.titleThree Methods of Control Flow Obfuscation on Java Software
分類:2004年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002004000054.pdf608.76 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。