Compilers: principles, techniques, and tools
Compilers: principles, techniques, and tools
ACM Transactions on Computer Systems (TOCS)
Encyclopedia of software engineering
Encyclopedia of software engineering
Compiler transformations for high-performance computing
ACM Computing Surveys (CSUR)
Decompilation of binary programs
Software—Practice & Experience
Manufacturing cheap, resilient, and stealthy opaque constructs
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Java Virtual Machine Specification
Java Virtual Machine Specification
The Java Language Specification
The Java Language Specification
Advanced obfuscation techniques for Java bytecode
Journal of Systems and Software
On instrumenting obfuscated java bytecode with aspects
Proceedings of the 2006 international workshop on Software engineering for secure systems
Polymorphing Software by Randomizing Data Structure Layout
DIMVA '09 Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Mobile code security on destination platform
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Plug-n-trust: practical trusted sensing for mhealth
Proceedings of the 10th international conference on Mobile systems, applications, and services
Hi-index | 0.00 |
The Java language is compiled into a platform independent bytecode format. Much of the information contained in the original source code remains in the bytecode, thus decompilation is easy. We will examine how code obfuscation can help protect Java bytecodes.