Doações 15 de Setembro 2024 – 1º de Outubro 2024 Sobre a angariação de fundos

A Taxonomy of Obfuscating Transformations

A Taxonomy of Obfuscating Transformations

Collberg C.
Quanto Você gostou deste livro?
Qual é a qualidade do ficheiro descarregado?
Descarregue o livro para avaliar a sua qualidade
De que qualidade são os ficheiros descarregados?
It has become more and more common to distribute software in forms that retain most or all of the information present in the original source code. An important example is Java bytecode. Since such codes are easy to decompile, they increase the risk of malicious reverse engineering attacks.In this paper we review several techniques for technical protection of software secrets. We will argue that automatic code obfuscation is currently the most viable method for preventing reverse engineering. We then describe the design of a code obfuscator, a tool which converts a program into an equivalent one that is more difficult to understand and reverse engineer.The obfuscator is based on the application of code transformations, in many cases similar to those used by compiler optimizers. We describe a large number of such transformations, classify them, and evaluate them with respect to their potency (To what degree is a human reader confused? ), resilience (How well are automatic deobfuscation attacks resisted? ), and cost (How much overhead is added to the application? ).We finally discuss some possible deobfuscation techniques (such as program slicing) and possible counter-measures an obfuscator could employ against them.
Idioma:
english
Arquivo:
PDF, 586 KB
IPFS:
CID , CID Blake2b
english0
Ler online
A converter para
Conversão para falhou

Frases chave