Obfuscation techniques for Java source code
Nowadays, software piracy becomes one of the headaches of any software companies. There are many techniques to protect a software from being copy, reverse-engineered or modified before delivering to user. Some of them can be listed out such as watermarking, embedding decryption keys in hardware, tam...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Student Research Paper |
Language: | English |
Published: |
2015
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/105732 http://hdl.handle.net/10220/26030 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-105732 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1057322020-09-27T20:27:02Z Obfuscation techniques for Java source code Nguyen, Dinh Phuc Vivek Balachandran Ng Wee Keong School of Computer Engineering DRNTU::Engineering::Computer science and engineering::Software Nowadays, software piracy becomes one of the headaches of any software companies. There are many techniques to protect a software from being copy, reverse-engineered or modified before delivering to user. Some of them can be listed out such as watermarking, embedding decryption keys in hardware, tamper-proofing, fingerprint code, virtual machine… Obfuscation is a very cheap and can be conducted at multiple levels of complexity and in multiple stages of a program. This technique secures the software by making it obscure and difficult for hackers to understand the function of codes and reverse-engineer.. This project focuses on obfuscation techniques at the highest level of a program: source code, namely variable and class renaming, array restructuring, including array splitting, array merging, array folding and array flattening. The project uses Java programming language and Java Development Tools in Plug-in environment of Eclipse. 2015-06-23T07:07:48Z 2019-12-06T21:56:50Z 2015-06-23T07:07:48Z 2019-12-06T21:56:50Z 2014 2014 Student Research Paper Nguyen, D. P. (2014). Obfuscation techniques for Java source code. Student research paper, Nanyang Technological University. https://hdl.handle.net/10356/105732 http://hdl.handle.net/10220/26030 en © 2014 The Author(s). 4 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering::Software |
spellingShingle |
DRNTU::Engineering::Computer science and engineering::Software Nguyen, Dinh Phuc Obfuscation techniques for Java source code |
description |
Nowadays, software piracy becomes one of the headaches of any software companies. There are many techniques to protect a software from being copy, reverse-engineered or modified before delivering to user. Some of them can be listed out such as watermarking, embedding decryption keys in hardware, tamper-proofing, fingerprint code, virtual machine… Obfuscation is a very cheap and can be conducted at multiple levels of complexity and in multiple stages of a program. This technique secures the software by making it obscure and difficult for hackers to understand the function of codes and reverse-engineer.. This project focuses on obfuscation techniques at the highest level of a program: source code, namely variable and class renaming, array restructuring, including array splitting, array merging, array folding and array flattening. The project uses Java programming language and Java Development Tools in Plug-in environment of Eclipse. |
author2 |
Vivek Balachandran |
author_facet |
Vivek Balachandran Nguyen, Dinh Phuc |
format |
Student Research Paper |
author |
Nguyen, Dinh Phuc |
author_sort |
Nguyen, Dinh Phuc |
title |
Obfuscation techniques for Java source code |
title_short |
Obfuscation techniques for Java source code |
title_full |
Obfuscation techniques for Java source code |
title_fullStr |
Obfuscation techniques for Java source code |
title_full_unstemmed |
Obfuscation techniques for Java source code |
title_sort |
obfuscation techniques for java source code |
publishDate |
2015 |
url |
https://hdl.handle.net/10356/105732 http://hdl.handle.net/10220/26030 |
_version_ |
1681057636833820672 |