Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33090
Array Data Transformation for Source Code Obfuscation
Authors: S. Praveen, P. Sojan Lal
Abstract:
Obfuscation is a low cost software protection methodology to avoid reverse engineering and re engineering of applications. Source code obfuscation aims in obscuring the source code to hide the functionality of the codes. This paper proposes an Array data transformation in order to obfuscate the source code which uses arrays. The applications using the proposed data structures force the programmer to obscure the logic manually. It makes the developed obscured codes hard to reverse engineer and also protects the functionality of the codes.Keywords: Reverse Engineering, Source Code Obfuscation.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1057421
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2035References:
[1] Markus Dahm, ÔÇÿByte Code Engineering with the BCEL API- Technical Report B-17-98, April 3, 2001.
[2] Arjan de Roo, Leon van den Oord, ÔÇÿStealthy obfuscation techniques: misleading the pirates-, Department of Computer Science, University of Twente Enschede, The Netherlands.
[3] Sharath.K.Udupa.Saumya K.Debray,Matias Madou, ÔÇÿDeobfuscation- Reverse Engineering obfuscated Code-, Proceedings of the 12th Working Conference on Reverse Engineering (WCRE-05).
[4] Christian Collberg, Ginger Myles, Michael Stepp, ÔÇÿAn Empirical Study of Java Bytecode Programs-,Department of Computer Science, University of Arizona.
[5] Christian Collberg Clark Thomborson Douglas Low, ÔÇÿBreaking Abstractions and Unstructuring Data Structures-,Department of Computer Science,The University of Auckland.
[6] Madou, M.; Anckaert, B.; De Bus,De Bosschere, K.; Cappaert, J.; Preneel, B.;ÔÇÿOn the Effectiveness of Source Code Transformations for Binary Obfuscation-, Proc. of the International Conference on Software Engineering Research and Practice (SERP06), June. 2006.
[7] Christian Collberg, Clark Thomborson, and Douglas Low, ÔÇÿA Taxonomy of obfuscating Transformations-, Report 148, Department of Computer Science, University of Auckland, July 1997.
[8] C. Collberg and C. Thomborson, ÔÇÿWatermarking,Tamper-proofing, and obfuscation - tools for software protection-, IEEE Transactions on Software Engineering, Vol. 28,pp. 735-746, August 2002.
[9] L. Ertaul, S. Venkatesh, ÔÇÿNovel Obfuscation Algorithms for Software Security-, Proceedings of the 2005 International Conference on Software Engineering Research and Practice, SERP-05, June, Las Vegas.
[10] Ira D. Baxter,Michael Mehlich, ÔÇÿReverse Engineering is Reverse Forward Engineering-, Proceedings of Fourth Working Conference on Reverse Engineering, 1997.