Preview

Preventing Reverse Engineering Threat in Java: Byte Code Obfuscation Techniques

Powerful Essays
Open Document
Open Document
3123 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Preventing Reverse Engineering Threat in Java: Byte Code Obfuscation Techniques
IEEE—ICET 2006
2nd International Conference on Emerging Technologies
Peshawar, Pakistan 13-14 November 2006
1-4244-0502-5/06/$20.00©2006 IEEE 689
Preventing Reverse Engineering Threat in Java
Using Byte Code Obfuscation Techniques
Jan M. Memon, Shams-ul-Arfeen, Asghar Mughal, Faisal Memon
Department of Computer Science
Isra University, Hyderabad, Pakistan
{janmohd, shams, asghar, faisal}@isra.edu.pk
Abstrac: Java programs are compiled into a platform independent byte code format. Much of the information contained in the source code is retained in the byte code. Consequently reverse engineering becomes much easier. Several software protection techniques have been developed, of which, code obfuscation seems to be a promising one. In this paper, two new byte code obfuscation techniques have been evolved. These techniques involve applying obfuscating transformations to the Java byte code. These techniques prevent automatic software analysis tools, De-compilers, from producing correct source code by introducing syntax and semantic errors in the generated source code. The proposed techniques are applied on sample Java class files to examine the effectiveness of the techniques in impeding reverse engineering.
The results reveal the erroneous codes generated by the tested de-compilers.
Keywords: reverse engineering, obfuscation, byte code, de-compiler
1. INTRODUCTION
Java provides platform independence to software programs. The software is compiled in the intermediate code format, the class file format. A class file contains massive amount of information enough for easy reverse engineering
[11]. When an organization sells its software, developed in Java, to the other organization, it delivers its software by providing the intermediate code format. The organization purchasing the software may break all the laws and obligations by simply hiring a software developer to reverse engineer the software often with the help of automated



References: [1] G. Nolan, Decompiling Java, Apress, Berkeley, 2004. Privacy, 2003, Vol. 1, No. 1, pp. 95-98. and Privacy, 2004, Vol. 2, No. 6, pp. 34-41. Network Associates Laboratories, 2003.

You May Also Find These Documents Helpful

  • Powerful Essays

    Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26 Chapter 27 An Introduction to Hardware, Software, and the Internet An Introduction to Software Development Objects and Classes Algorithms Java Syntax and Style Data Types, Variables, and Arithmetic Boolean Expressions and if-else Statements Iterative Statements: while, for, do–while Implementing Classes and Using Objects Strings Class Hierarchies and Interfaces Arrays…

    • 3908 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 3 research

    • 481 Words
    • 2 Pages

    Reverse engineering is taking apart an object to see how it works in order to duplicate or enhance the object. The practice, taken from older industries, is now frequently used on computer hardware and software. Software reverse engineering involves reversing a program's machine code (the string of 0s and 1s that are sent to the logic processor) back into the source code that it was written in, using program language statements.…

    • 481 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Baiting is a process in which we use an actual bait. A real-world Trojan horse which can be physical media is used as bait . It relies on the fact that the prey might go for the bait because of his curiosity or greed. Malware-infected floppy disks, CD-ROMs, or USB flash drives are left by the attackers in locations where people can easily find them - bathrooms, elevators, sidewalks, parking lots, etc. Then these media are given legitimate and curiosity-piquing labels and then they wait for the prey to take the bait. For example, an attacker might design a disk featuring a company logo downloaded from the target's website. He might label it "Emloyee Salary Q2 2017". The disk is then left on the floor of an elevator or somewhere in the lobby…

    • 137 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    tokens and coins and no ads for play UNO & Friends. Download now from bellow…

    • 325 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Breaking The Enigma Code

    • 1514 Words
    • 7 Pages

    One one of the primary causes of the end of World War two was the breaking of the German Enigma codes. Other short-term consequences lead to First, the decimation of the Italian fleet at the Cape of Matapan in 1941, due to intercepted Italian signals by Bletchley Park, the sinking of Scharnhorst in 1943, as well due to findings be Bletchley Park, and the greatest contribution— the defeat of German U boats in the Atlantic.…

    • 1514 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Program Reengineering

    • 1367 Words
    • 6 Pages

    1. Analyze four policy choices of Mayor Schell that were made as part of the strategy for the homeless.…

    • 1367 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    One person's code is another's challenge. Cryptanalysts are people who break codes. They're most important clue is how often certain letters and word's appear. In English, as and is occur most often, and the is the most common word. Code breakers first goal is to identify these frequently occurring letters. Then they’ll start to figure out the words the letters appear in. Once they know what the code uses to mean e and t, theyre able to find the word the. Then they'll know what the code uses for h. Its a hard job, but its rewards are many.…

    • 103 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.…

    • 2426 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Thesis Statement: Since homelessness affects a diverse array of people, there is a dire need to address homelessness and these specialized areas that…

    • 1533 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    TOEFL listening

    • 477 Words
    • 2 Pages

    Hackers TOEFL Listening Intermediate 목차 Category Page File name 1-5 24-25 Diagnostic Test 1-5 6-11 26-27 Diagnostic Test 6-11 12-17 28-29 Diagnostic Test 12-17 Diagnostic Test Diagnostic Test Chapter 1. Main Purpose/Topic 1-3 4-6 35 CH 1. Hackers Practice 4-6 36 CH 1. Hackers Practice 7-9 10-12 37 CH 1.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    java

    • 312 Words
    • 2 Pages

    AllocationStrategy.java import java.util. ArrayList; import java.util. Collection; import java.util. Iterator; import java.util. List; import java.util.…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Java

    • 762 Words
    • 4 Pages

    In the long distant future, in the year 2016, the cable news empire has fallen, and former talking heads have stooped to running for political office. In fact, five former talk show stars are running for President of the United States, and locked in a close race.…

    • 762 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Java

    • 2071 Words
    • 9 Pages

    The Next Gen IT Trends & Web Technologies – Course Plan - Version 1.1 is released for…

    • 2071 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Except for those constraints imposed by the Internet environment, Java gives the programmer, full control.…

    • 7148 Words
    • 27 Pages
    Powerful Essays

Related Topics