COMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS

<p align="justify">For programs written in the Java programming language, obfuscation can be used to protect the intellectual property contained in the program. There is a large amount of information given in the Java .class file, making decompilation easy to do. There is many obfusc...

Full description

Saved in:
Bibliographic Details
Main Author: WIDYATAMA (NIM 23204014); Pembimbing: Dr. Ir. Bambang Riyanto, YUDHI
Format: Theses
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/19731
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:19731
spelling id-itb.:197312017-09-27T15:37:37ZCOMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS WIDYATAMA (NIM 23204014); Pembimbing: Dr. Ir. Bambang Riyanto, YUDHI Indonesia Theses INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/19731 <p align="justify">For programs written in the Java programming language, obfuscation can be used to protect the intellectual property contained in the program. There is a large amount of information given in the Java .class file, making decompilation easy to do. There is many obfuscators that inhibits decompilation or make the resulting source code difficult to understand. This thesis compares six Java obfuscators, three of which are open source, and the other three are commercial.<p align="justify"><p>Reverse transformations are performed to remove low-resilience obfuscation transformations, then decompilation is done to extract source code. Reverse transformations performed include name remapping, string encryption removal, fake exception handling removal, and transparent predicate removal.<p align="justify"><p>Comparisons are done by measuring complexity aspects of the source code, that is : program size, number of conditionals, total conditional complexity, number of local variables, number of abrupt flow statements, number of labeled blocks. This thesis shows the advantage and disadvantage of the compared obfuscators. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description <p align="justify">For programs written in the Java programming language, obfuscation can be used to protect the intellectual property contained in the program. There is a large amount of information given in the Java .class file, making decompilation easy to do. There is many obfuscators that inhibits decompilation or make the resulting source code difficult to understand. This thesis compares six Java obfuscators, three of which are open source, and the other three are commercial.<p align="justify"><p>Reverse transformations are performed to remove low-resilience obfuscation transformations, then decompilation is done to extract source code. Reverse transformations performed include name remapping, string encryption removal, fake exception handling removal, and transparent predicate removal.<p align="justify"><p>Comparisons are done by measuring complexity aspects of the source code, that is : program size, number of conditionals, total conditional complexity, number of local variables, number of abrupt flow statements, number of labeled blocks. This thesis shows the advantage and disadvantage of the compared obfuscators.
format Theses
author WIDYATAMA (NIM 23204014); Pembimbing: Dr. Ir. Bambang Riyanto, YUDHI
spellingShingle WIDYATAMA (NIM 23204014); Pembimbing: Dr. Ir. Bambang Riyanto, YUDHI
COMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS
author_facet WIDYATAMA (NIM 23204014); Pembimbing: Dr. Ir. Bambang Riyanto, YUDHI
author_sort WIDYATAMA (NIM 23204014); Pembimbing: Dr. Ir. Bambang Riyanto, YUDHI
title COMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS
title_short COMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS
title_full COMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS
title_fullStr COMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS
title_full_unstemmed COMPARISON OF OBFUSCATION METHODS IN JAVA OBFUSCATORS
title_sort comparison of obfuscation methods in java obfuscators
url https://digilib.itb.ac.id/gdl/view/19731
_version_ 1821119930478624768