TY - GEN
T1 - Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods
AU - Fukushima, Kazuhide
AU - Tabata, Toshihiro
AU - Sakurai, Kouichi
PY - 2003/12/1
Y1 - 2003/12/1
N2 - Recently, Java has been spread widely. However, Java has a problem that an attacker can reconstruct Java source codes from Java classfiles. Therefore many techniques for protecting Java software have been proposed, but, quantitive security evaluations are not fully given. This paper proposes an obfuscation scheme for Java source codes by destructing the encapsulation. In addition, we propose an evaluation scheme on the number of accesses to the fields and the methods of the other classes. We try to realize tamper-resistant software with the certain quantitive basis of security using our evaluation.
AB - Recently, Java has been spread widely. However, Java has a problem that an attacker can reconstruct Java source codes from Java classfiles. Therefore many techniques for protecting Java software have been proposed, but, quantitive security evaluations are not fully given. This paper proposes an obfuscation scheme for Java source codes by destructing the encapsulation. In addition, we propose an evaluation scheme on the number of accesses to the fields and the methods of the other classes. We try to realize tamper-resistant software with the certain quantitive basis of security using our evaluation.
KW - Java
KW - Obfuscation
KW - Software metrics
KW - Software security
UR - http://www.scopus.com/inward/record.url?scp=2642513151&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=2642513151&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:2642513151
SN - 0889864020
T3 - Proceedings of the IASTED International Conference on Communication, Network, and Information Security
SP - 108
EP - 113
BT - Proceedings of the IASTED International Conference on Communication, Network, and Information Security
A2 - Hamza, M.H.
T2 - Proceedings of the IASTED International Conference on Communication, Network, an d Information Security
Y2 - 10 December 2003 through 12 December 2003
ER -