ASPECT-ORIENTED CODE OBFUSCATION

被引:0
作者
Padayachee, Keshnee [1 ]
机构
[1] Univ S Africa, Sch Comp, UNISA, ZA-0003 Pretoria, Gauteng, South Africa
来源
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING | 2009年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper reports on an exploratory study investigating the feasibility of using aspect-oriented constructs to instrument objects for the purposes of code obfuscation. With Java programs it is difficult to protect the intellectual property rights and secret information in untrusted environments. Consequently the utilization of software obfuscation techniques has become relevant. It has been found that Aspect-Oriented programming might be abused to overcome advanced code obfuscation used in Java Bytecode. In this paper possible intervention strategy to prevent these types of attacks using aspect-oriented programming language such as AspectJ is presented.
引用
收藏
页码:252 / 257
页数:6
相关论文
共 17 条
[1]  
ALEXANDER RT, 2002, ICSE WORKSH SOFTW QU
[2]   Advanced obfuscation techniques for Java']Java bytecode [J].
Chan, JT ;
Yang, W .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 71 (1-2) :1-10
[3]  
CHEN K, 2006, SESS 06, P19
[4]  
Collberg C., 1997, A Taxonomy of Obfuscating Transformations
[5]  
De Win B., 2002, Informatica, V26, P141
[6]  
Debusmann M, 2003, LECT NOTES COMPUT SC, V2867, P209
[7]  
Deters Morgan., 2001, P OOPSLA 2001 WORKSH
[8]   Getting started with AspectJ - An aspect-oriented extension to Java']Java enables plug-and-play implementations of crosscutting. [J].
Kiczales, G ;
Hilsdale, E ;
Hugunin, J ;
Kersten, M ;
Palm, J ;
Griswold, WG .
COMMUNICATIONS OF THE ACM, 2001, 44 (10) :59-65
[9]  
Kiczales G., 2000, WORKSH MULT SEP CONC, P1
[10]  
Lippert M., 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium, P418, DOI 10.1109/ICSE.2000.870432