2012 7th International Conference on Computer Science &Amp; Education (ICCSE) 2012
DOI: 10.1109/iccse.2012.6295254
|View full text |Cite
|
Sign up to set email alerts
|

Technique of source code obfuscation based on data flow and control flow tansformations

Abstract: This paper mainly present a solution to cross platform problem about the obfuscation in C/C++ source code, and describe the principle and performance of source code obfuscation algorithm, such as layout obfuscation, data flow obfuscation and control structure flow obfuscation. And it analysis's the obfuscation algorithm's performance of the strength, flexibility, and cost by experimentation. Finally, it discusses the prospect of the research and application of the source code obfuscation technology.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The test data are shown in Table 2. Those programs were randomly chosen from sonartype releases maven repository 4 . That is, the…”
Section: Test Datamentioning
confidence: 99%
See 1 more Smart Citation
“…The test data are shown in Table 2. Those programs were randomly chosen from sonartype releases maven repository 4 . That is, the…”
Section: Test Datamentioning
confidence: 99%
“…An obfuscation method is to change programs hard to understand by preserving input/output specification. Various obfuscation methods are proposed [2][3][4], and are implemented to tools, such as Dash-O 2 , ProGuard 3 , and etc. In particular, the Identifier Renaming Method (IRM) is widely used, which changes the identifiers in the programs to meaningless names.…”
Section: Introductionmentioning
confidence: 99%