Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods

Kazuhide Fukushima, Toshihiro Tabata, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Recently, Java has been spread widely. However, Java has a problem that an attacker can reconstruct Java source codes from Java classfiles. Therefore many techniques for protecting Java software have been proposed, but, quantitive security evaluations are not fully given. This paper proposes an obfuscation scheme for Java source codes by destructing the encapsulation. In addition, we propose an evaluation scheme on the number of accesses to the fields and the methods of the other classes. We try to realize tamper-resistant software with the certain quantitive basis of security using our evaluation.

Original languageEnglish
Title of host publicationProceedings of the IASTED International Conference on Communication, Network, and Information Security
EditorsM.H. Hamza
Pages108-113
Number of pages6
Publication statusPublished - Dec 1 2003
EventProceedings of the IASTED International Conference on Communication, Network, an d Information Security - New York, NY., United States
Duration: Dec 10 2003Dec 12 2003

Publication series

NameProceedings of the IASTED International Conference on Communication, Network, and Information Security

Other

OtherProceedings of the IASTED International Conference on Communication, Network, an d Information Security
CountryUnited States
CityNew York, NY.
Period12/10/0312/12/03

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods'. Together they form a unique fingerprint.

  • Cite this

    Fukushima, K., Tabata, T., & Sakurai, K. (2003). Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods. In M. H. Hamza (Ed.), Proceedings of the IASTED International Conference on Communication, Network, and Information Security (pp. 108-113). (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).