Java code obfuscator to prevent reverse engineering of android application
Computer software is generally vulnerable to intellectual property theft, which includes trademark algorithms, sensitive data and credentials stored in the code. Java programs are particularly easier to reverse engineer, compared to compiled ones. A Java program is compiled into Java byte code, the...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Computer software is generally vulnerable to intellectual property theft, which includes trademark algorithms, sensitive data and credentials stored in the code. Java programs are particularly easier to reverse engineer, compared to compiled ones. A Java program is compiled into Java byte code, the instruction set of the Java virtual machine. The compiled Java byte code can be easily reverse engineered back to the original source code using the available decompilers. Many tools in current research focused on merely scrambling the names of the identifiers by substituting the identifiers with meaningless names, but it cannot deter a determined cracker very long. We proposed several advanced obfuscation techniques, which transforms the given source code into a more complex, but semantically equivalent, which makes the debugging process comparatively tedious. Further, the vulnerability and code smells of the java code are improved post the obfuscation. |
---|---|
ISSN: | 0094-243X 1551-7616 |
DOI: | 10.1063/5.0153446 |