Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Obfuscate Java bytecode: an evaluation ofobfuscating transformations using JBCO
KTH, School of Computer Science and Communication (CSC).
2014 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Today, software is one of the most complex and intriguing technologies around us. Software development companies must be able to protect their products in order to stay strong against its competitors and against other threats. One solution to this problem is code obfuscation. This master’s thesis investigates how to protect Java source codeagainst reverse engineering. Three obfuscating transformations was successfully implemented and evaluated within a specific obfuscator named JBCO. The conclusion is that in many cases, code obfuscation provides a higher level of obscurity to a program, which makes code obfuscation a good supplement to complicate the reverse engineering process.

Abstract [sv]

Obfuskera Java bytekod: en utvärdering av obfuskeringstransformationer med JBCO. För att ett företag ska vara konkurrenskraftigt krävs det ofta att företaget skyddar sina produkter. Det kan vara förödande för ett företag om en konkurrent får tillgång till deras produkthemligheter och leda till företagets undergång.Detta gäller framförallt företag som utvecklar mjukvara. En lösning på detta problem är kodobfuskering. Detta examensarbete undersöker hur man skyddar Java källkod mot dekompilatorer.Tre stycken obfuskeringstransformationer implementerades och evaluerades i obfuskeraren JBCO. Slutsatsenär att kodobfuskering i många fall leder till att ett program blir svårare att tyda för en människa. Detta gör obfuskering till ett bra komplement för att försvåra processen att dekompilera ett program.

Place, publisher, year, edition, pages
2014.
National Category
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-153909OAI: oai:DiVA.org:kth-153909DiVA: diva2:753862
Examiners
Available from: 2014-11-21 Created: 2014-10-09 Last updated: 2014-11-21Bibliographically approved

Open Access in DiVA

fulltext(1718 kB)519 downloads
File information
File name FULLTEXT01.pdfFile size 1718 kBChecksum SHA-512
a27784ed8e37594b1133ad72c876f2d8bc7e5a6488e3691cb8a4f9d0c7083038ec54d28530c7891a68bdfa10d5c9dd2aeb573ae10a5ea1215b8960311f6b048c
Type fulltextMimetype application/pdf

By organisation
School of Computer Science and Communication (CSC)
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 519 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 187 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf