Technique of Code Obfuscation Based on Class Structure

2012 ◽  
Vol 271-272 ◽  
pp. 674-678
Author(s):  
Yong Yong Sun ◽  
Guang Qiu Huang

Software protection technology is necessary for software security and property right of software. The algorithm of code obfuscation based on class is proposed that uses of obfuscation technology. The overall architecture of the system is hidden by changing the class diagram for class aggregation, and the algorithm of class aggregation can be used to design class hierarchy in object-oriented program. It makes static analysis difficult while preserving function of program. The interfaces replace original classes to achieve reference in order to implement type hidden, and automatic analysis becomes more difficult.

2012 ◽  
Vol 271-272 ◽  
pp. 636-640
Author(s):  
Yong Yong Sun ◽  
Guang Qiu Huang

The security of software is threatened by piracy, tampering and reverse engineering. Attackers attempt to get important algorithms and sensitive data of software by static analysis or reverse engineering. Software protection becomes an important problem. The algorithm of code obfuscation based on class splitting is proposed that uses of obfuscation technology. The definition of class splitting and realization on algorithm are described. At the same time, the performance on algorithm is analyzed. The obfuscation method enhances the degree of complication about program and static analysis becomes more difficult. The algorithm is applicable to object-oriented program with class structure.


2013 ◽  
Vol 373-375 ◽  
pp. 1691-1694
Author(s):  
Zhi Yue Wang ◽  
Wei Min Wu ◽  
Wen Rui Ma ◽  
Jin Liang Li ◽  
Zhi Wei Huang

In view of the increasingly serious software protection problem, the software protection technology based on code obfuscation is analyzed and researched, and a new software protection system, maze protection is designed and realized. With the principle of maze encryption, this program insert a large number of the complex judgments code between function entry and exit, which change the execution order, enhancing the ability of software protection. On this basis, Anti-debug techniques incorporated into the maze protection, which against the mainstream anti-debugger, increasing the advantage of high anti-reversing, tamper-proof and anti-cracking. Experimental analysis has proved that this maze protection technology was better than other virtual machine protection technologies.


Author(s):  
Anoushirvan Rashidinia ◽  
S. Gavrilenko ◽  
M. Pochebut ◽  
O. Sytnikova

The article analyzes the main threats and problems of software protection. Methods for protecting information, their advantages and disadvantages are considered, and the possibility of using existing tools to protect software is studied. The possibility of improving and using a number of software protection methods against active fraud attacks was brought. Type of attacks exists and why protection is necessary was specified. Furthermore, we discussed several states of the art protection techniques which can be used in software to protect against analysis and tampering attacks. Analyzed such methods: Client-Server Solutions, Code Encryption, Code Diversity, Code Obfuscation, White-Box Cryptography, Tamper Resistant Software, Software Guards, Oblivious Hashing. Although we considered all these possible techniques separately, it is possible to combine these techniques into one solution.


2009 ◽  
Vol 29 (3) ◽  
pp. 817-822
Author(s):  
Li-guo ZHOU ◽  
Xiao-bing XIONG ◽  
Jie SUN

2013 ◽  
Vol 443 ◽  
pp. 556-560
Author(s):  
Gao Ming He

This paper describes a system; CODESSEAL can provide protection and evaluation to system software. CODESSEAL was designed to protect embedded systems with sufficient expertise and resources to capture attack equipment and manipulator, not only to protect software but also to protect hardware. By using the reconfigurable hardware allows CODESSEAL to provide confidentiality, integrity of security services and a platform-independent program flow without having to redesign the processor. System uses software and data protection technology and designs cycle simulation methods for data analysis. Experimental results show that the protected instructions and data with a high level of safety can be realized a low, which in most cases the performance loss can be reduced to below 10%, so the research of software protection methods of the embedded operating system of hardware compiler has important practical significance.


2018 ◽  
Vol 34 (2) ◽  
pp. 181-204
Author(s):  
Charles S. Preston

The origin story of the Licchavis, retold in two commentaries on Nik?ya texts, has received some scant attention in the modern scholastic record, yet has usually been either cast aside as so much myth or has been recast in thematic or structural studies that align it with other tales of incest, foundling narratives, or origin stories of ga?a-sa?ghas. This article argues against those interpretations and offers a thorough rereading of the story as not only encoding a class hierarchy but also, in so doing, critiquing the Brahmanical class structure and the concept of svabh?va by birth. In this new interpretation of the story, and by reading it alongside other narratives, it becomes apparent that the origin story of the Licchavis makes sense within the context of the Buddhist commentaries where it is found. The account of their origins is not merely retelling an old story but furthering a Buddhist message.


2021 ◽  
Vol 111 ◽  
pp. 102470
Author(s):  
Anh Nguyen-Duc ◽  
Manh Viet Do ◽  
Quan Luong Hong ◽  
Kiem Nguyen Khac ◽  
Anh Nguyen Quang

Author(s):  
N. V. Goryuk ◽  

The article investigates automation methods and means of integration of static source security analysis technology. The process of software security analysis, which is implemented by the technology of static analysis of the source code, is studied, and the methods of solving the problem of automation and integration of the technology into the source code development environment are offered. The perspective direction of further development of the technology of static analysis of the source code is established.


Author(s):  
Dewan Pelawi

To generate an information system which is in accordance with the needs of company requires an analysis of business processes by observing the running system. Solutions for problems found when doing the business are observed using the systems approach. Object-oriented analysis and design is a method currently used to build an information system. The system development with "Object Oriented Analysis & Design (OOAD)" method stated by Satzinger includes making activity diagram, event table, class diagram, usecase diagrams, usecase description, state chart diagram, deployment and software architecture, first-cut design class diagram, simple sequence diagram (SSD), the sequence diagram (first-cut, view layer, data access layer), communication diagram, updated design class diagram, package diagram, persistent object, user interface. The result obtained after performing all phases is an information system that fits the company needs which is expected to improve the performance and effectiveness in business processes and also support the company's business goals.


Sign in / Sign up

Export Citation Format

Share Document