Entity

Time filter

Source Type


Wang J.-M.,Tsinghua University | Wang J.-M.,Tsinghua Laboratory for Information Science and Technology | Wang J.-M.,Key Laboratory for Information System Security of Ministry of Education | Yu Z.-W.,Tsinghua University | And 8 more authors.
Jisuanji Xuebao/Chinese Journal of Computers | Year: 2011

Obfuscation techniques have been widely applied in the defenses of reverse engineering and re-engineering attacks. From the view of the development of obfuscation, we briefly discussed the principles, algorithms, different kinds of attack approaches and evaluating standard. Java program obfuscation algorithms can be divided into two types: One is obfuscation within a class; the other is obfuscation between classes. Finally, based on the survey of these obfuscation techniques, the future research of Java program obfuscation is also stated. Source

Discover hidden collaborations