Obfuscation techniques for Java source code
Nowadays, software piracy becomes one of the headaches of any software companies. There are many techniques to protect a software from being copy, reverse-engineered or modified before delivering to user. Some of them can be listed out such as watermarking, embedding decryption keys in hardware, tam...
Saved in:
Main Author: | Nguyen, Dinh Phuc |
---|---|
Other Authors: | Vivek Balachandran |
Format: | Student Research Paper |
Language: | English |
Published: |
2015
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/105732 http://hdl.handle.net/10220/26030 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Software code protection through software obfuscation
by: Liang, Shan
Published: (2010) -
TAD : time side-channel attack defense of obfuscated source code
by: Fell, Alexander, et al.
Published: (2021) -
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
by: KANDAPPU, Thivya, et al.
Published: (2018) -
Software protection system : binary control flow obfuscation for portable executables
by: Chew, Ron Jun Hong.
Published: (2012) -
Software protection through obfuscation
by: Balachandran, Vivek
Published: (2015)