By Topic

Research on Java Bytecode Parse and Obfuscate Tool

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Yang Le ; Coll. of Comput. Inf. & Eng., Jiangxi Agric. Univ., Nanchang, China ; He Huo-jiao

The compiled Java class file is not really binary files, it's just a kind of in-between code. This makes it possible for hackers to decompile the java class file, and in fact the decompiled file is almost the same as the original one. So it's very hard to protect the java application program, and there's a big issue about the security of java class file. This paper treated protecting software and using more costly forms of reverse engineering as the target, and deeply researched reverse engineering and code obfuscation about defense and attack. A prototype of Code obfuscation system (JOT) based on Java byte code is realized.

Published in:

Computer Science & Service System (CSSS), 2012 International Conference on

Date of Conference:

11-13 Aug. 2012