Preview

Preventing Reverse Engineering Threat in Java: Byte Code Obfuscation Techniques

Powerful Essays
Open Document
Open Document
3123 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Preventing Reverse Engineering Threat in Java: Byte Code Obfuscation Techniques
IEEE—ICET 2006
2nd International Conference on Emerging Technologies
Peshawar, Pakistan 13-14 November 2006
1-4244-0502-5/06/$20.00©2006 IEEE 689
Preventing Reverse Engineering Threat in Java
Using Byte Code Obfuscation Techniques
Jan M. Memon, Shams-ul-Arfeen, Asghar Mughal, Faisal Memon
Department of Computer Science
Isra University, Hyderabad, Pakistan
{janmohd, shams, asghar, faisal}@isra.edu.pk
Abstrac: Java programs are compiled into a platform independent byte code format. Much of the information contained in the source code is retained in the byte code. Consequently reverse engineering becomes much easier. Several software protection techniques have been developed, of which, code obfuscation seems to be a promising one. In this paper, two new byte code obfuscation techniques have been evolved. These techniques involve applying obfuscating transformations to the Java byte code. These techniques prevent automatic software analysis tools, De-compilers, from producing correct source code by introducing syntax and semantic errors in the generated source code. The proposed techniques are applied on sample Java class files to examine the effectiveness of the techniques in impeding reverse engineering.
The results reveal the erroneous codes generated by the tested de-compilers.
Keywords: reverse engineering, obfuscation, byte code, de-compiler
1. INTRODUCTION
Java provides platform independence to software programs. The software is compiled in the intermediate code format, the class file format. A class file contains massive amount of information enough for easy reverse engineering
[11]. When an organization sells its software, developed in Java, to the other organization, it delivers its software by providing the intermediate code format. The organization purchasing the software may break all the laws and obligations by simply hiring a software developer to reverse engineer the software often with the help of automated



References: [1] G. Nolan, Decompiling Java, Apress, Berkeley, 2004. Privacy, 2003, Vol. 1, No. 1, pp. 95-98. and Privacy, 2004, Vol. 2, No. 6, pp. 34-41. Network Associates Laboratories, 2003.

You May Also Find These Documents Helpful

  • Better Essays

    * User education in awareness, safe computing practices, indicators of malicious code, and response actions.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Baiting is a process in which we use an actual bait. A real-world Trojan horse which can be physical media is used as bait . It relies on the fact that the prey might go for the bait because of his curiosity or greed. Malware-infected floppy disks, CD-ROMs, or USB flash drives are left by the attackers in locations where people can easily find them - bathrooms, elevators, sidewalks, parking lots, etc. Then these media are given legitimate and curiosity-piquing labels and then they wait for the prey to take the bait. For example, an attacker might design a disk featuring a company logo downloaded from the target's website. He might label it "Emloyee Salary Q2 2017". The disk is then left on the floor of an elevator or somewhere in the lobby…

    • 137 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Binary Code

    • 597 Words
    • 3 Pages

    Did you know that all of the information that travels through your computer is based on two commands? It's true. The only data that a computer can understand is on and off. But, the millions of combinations of those two commands given in series are what make a computer work.…

    • 597 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Breaking The Enigma Code

    • 1514 Words
    • 7 Pages

    One one of the primary causes of the end of World War two was the breaking of the German Enigma codes. Other short-term consequences lead to First, the decimation of the Italian fleet at the Cape of Matapan in 1941, due to intercepted Italian signals by Bletchley Park, the sinking of Scharnhorst in 1943, as well due to findings be Bletchley Park, and the greatest contribution— the defeat of German U boats in the Atlantic.…

    • 1514 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    One person's code is another's challenge. Cryptanalysts are people who break codes. They're most important clue is how often certain letters and word's appear. In English, as and is occur most often, and the is the most common word. Code breakers first goal is to identify these frequently occurring letters. Then they’ll start to figure out the words the letters appear in. Once they know what the code uses to mean e and t, theyre able to find the word the. Then they'll know what the code uses for h. Its a hard job, but its rewards are many.…

    • 103 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    tokens and coins and no ads for play UNO & Friends. Download now from bellow…

    • 325 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Program Reengineering

    • 1367 Words
    • 6 Pages

    1. Analyze four policy choices of Mayor Schell that were made as part of the strategy for the homeless.…

    • 1367 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.…

    • 2426 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Thesis Statement: Since homelessness affects a diverse array of people, there is a dire need to address homelessness and these specialized areas that…

    • 1533 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    TOEFL listening

    • 477 Words
    • 2 Pages

    Hackers TOEFL Listening Intermediate 목차 Category Page File name 1-5 24-25 Diagnostic Test 1-5 6-11 26-27 Diagnostic Test 6-11 12-17 28-29 Diagnostic Test 12-17 Diagnostic Test Diagnostic Test Chapter 1. Main Purpose/Topic 1-3 4-6 35 CH 1. Hackers Practice 4-6 36 CH 1. Hackers Practice 7-9 10-12 37 CH 1.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    java

    • 312 Words
    • 2 Pages

    AllocationStrategy.java import java.util. ArrayList; import java.util. Collection; import java.util. Iterator; import java.util. List; import java.util.…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Java

    • 762 Words
    • 4 Pages

    In the long distant future, in the year 2016, the cable news empire has fallen, and former talking heads have stooped to running for political office. In fact, five former talk show stars are running for President of the United States, and locked in a close race.…

    • 762 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Java

    • 2071 Words
    • 9 Pages

    The Next Gen IT Trends & Web Technologies – Course Plan - Version 1.1 is released for…

    • 2071 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Except for those constraints imposed by the Internet environment, Java gives the programmer, full control.…

    • 7148 Words
    • 27 Pages
    Powerful Essays
  • Better Essays

    Introduction Our Contribution Generation of Program Invariants using Abstract Interpretation Framework 41st Annual International IEEE/IFIP conference, DSN- 2011, Hong Kong Anirban Roy Choudhury Homi Bhabha National Institute Mumbai, India 30 June, 2011 Anirban Roy Choudhury Generation of Program Invariants using Abstract Interpretation Introduction Our Contribution Abstract Interpretation Abstract Domains Motivation A faulty computer software can cause significant economic and human loss eg.…

    • 2661 Words
    • 11 Pages
    Better Essays

Related Topics