Java code obfuscator to prevent reverse engineering of android application

Computer software is generally vulnerable to intellectual property theft, which includes trademark algorithms, sensitive data and credentials stored in the code. Java programs are particularly easier to reverse engineer, compared to compiled ones. A Java program is compiled into Java byte code, the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Parandaman, Harshavardhan, Arul, Beulah, Dinakaran, Logesh
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Computer software is generally vulnerable to intellectual property theft, which includes trademark algorithms, sensitive data and credentials stored in the code. Java programs are particularly easier to reverse engineer, compared to compiled ones. A Java program is compiled into Java byte code, the instruction set of the Java virtual machine. The compiled Java byte code can be easily reverse engineered back to the original source code using the available decompilers. Many tools in current research focused on merely scrambling the names of the identifiers by substituting the identifiers with meaningless names, but it cannot deter a determined cracker very long. We proposed several advanced obfuscation techniques, which transforms the given source code into a more complex, but semantically equivalent, which makes the debugging process comparatively tedious. Further, the vulnerability and code smells of the java code are improved post the obfuscation.
ISSN:0094-243X
1551-7616
DOI:10.1063/5.0153446