COMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS
<p align="justify">For programs written in the Java programming language, obfuscation can be used to protect the intellectual property contained in the program. There is a large amount of information given in the Java .class file, making decompilation easy to do. There is many obfusc...
Saved in:
Main Author: | |
---|---|
Format: | Theses |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/19731 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
id |
id-itb.:19731 |
---|---|
spelling |
id-itb.:197312017-09-27T15:37:37ZCOMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS WIDYATAMA (NIM 23204014); Pembimbing: Dr. Ir. Bambang Riyanto, YUDHI Indonesia Theses INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/19731 <p align="justify">For programs written in the Java programming language, obfuscation can be used to protect the intellectual property contained in the program. There is a large amount of information given in the Java .class file, making decompilation easy to do. There is many obfuscators that inhibits decompilation or make the resulting source code difficult to understand. This thesis compares six Java obfuscators, three of which are open source, and the other three are commercial.<p align="justify"><p>Reverse transformations are performed to remove low-resilience obfuscation transformations, then decompilation is done to extract source code. Reverse transformations performed include name remapping, string encryption removal, fake exception handling removal, and transparent predicate removal.<p align="justify"><p>Comparisons are done by measuring complexity aspects of the source code, that is : program size, number of conditionals, total conditional complexity, number of local variables, number of abrupt flow statements, number of labeled blocks. This thesis shows the advantage and disadvantage of the compared obfuscators. text |
institution |
Institut Teknologi Bandung |
building |
Institut Teknologi Bandung Library |
continent |
Asia |
country |
Indonesia Indonesia |
content_provider |
Institut Teknologi Bandung |
collection |
Digital ITB |
language |
Indonesia |
description |
<p align="justify">For programs written in the Java programming language, obfuscation can be used to protect the intellectual property contained in the program. There is a large amount of information given in the Java .class file, making decompilation easy to do. There is many obfuscators that inhibits decompilation or make the resulting source code difficult to understand. This thesis compares six Java obfuscators, three of which are open source, and the other three are commercial.<p align="justify"><p>Reverse transformations are performed to remove low-resilience obfuscation transformations, then decompilation is done to extract source code. Reverse transformations performed include name remapping, string encryption removal, fake exception handling removal, and transparent predicate removal.<p align="justify"><p>Comparisons are done by measuring complexity aspects of the source code, that is : program size, number of conditionals, total conditional complexity, number of local variables, number of abrupt flow statements, number of labeled blocks. This thesis shows the advantage and disadvantage of the compared obfuscators. |
format |
Theses |
author |
WIDYATAMA (NIM 23204014); Pembimbing: Dr. Ir. Bambang Riyanto, YUDHI |
spellingShingle |
WIDYATAMA (NIM 23204014); Pembimbing: Dr. Ir. Bambang Riyanto, YUDHI COMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS |
author_facet |
WIDYATAMA (NIM 23204014); Pembimbing: Dr. Ir. Bambang Riyanto, YUDHI |
author_sort |
WIDYATAMA (NIM 23204014); Pembimbing: Dr. Ir. Bambang Riyanto, YUDHI |
title |
COMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS |
title_short |
COMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS |
title_full |
COMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS |
title_fullStr |
COMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS |
title_full_unstemmed |
COMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS |
title_sort |
comparison of obfuscation methods in java obfuscators |
url |
https://digilib.itb.ac.id/gdl/view/19731 |
_version_ |
1821119930478624768 |