This paper reports on an evaluation result of current obfuscation techniques for Java byte code, such as Collberg's techniques in terms of mutational capability, real-time applicability, and program size increase. We suggest effective obfuscation techniques for random and real-time obfuscation (RR obfuscation). In the evaluation results, the combination of some obfuscation techniques was found to be useful for RR obfuscation, and some obfuscation techniques makes little or no difference after a certain threshold.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Shinsaku KIYOMOTO, Toshiaki TANAKA, "Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques" in IEICE TRANSACTIONS on Fundamentals,
vol. E89-A, no. 1, pp. 222-226, January 2006, doi: 10.1093/ietfec/e89-a.1.222.
Abstract: This paper reports on an evaluation result of current obfuscation techniques for Java byte code, such as Collberg's techniques in terms of mutational capability, real-time applicability, and program size increase. We suggest effective obfuscation techniques for random and real-time obfuscation (RR obfuscation). In the evaluation results, the combination of some obfuscation techniques was found to be useful for RR obfuscation, and some obfuscation techniques makes little or no difference after a certain threshold.
URL: https://globals.ieice.org/en_transactions/fundamentals/10.1093/ietfec/e89-a.1.222/_p
Copy
@ARTICLE{e89-a_1_222,
author={Shinsaku KIYOMOTO, Toshiaki TANAKA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques},
year={2006},
volume={E89-A},
number={1},
pages={222-226},
abstract={This paper reports on an evaluation result of current obfuscation techniques for Java byte code, such as Collberg's techniques in terms of mutational capability, real-time applicability, and program size increase. We suggest effective obfuscation techniques for random and real-time obfuscation (RR obfuscation). In the evaluation results, the combination of some obfuscation techniques was found to be useful for RR obfuscation, and some obfuscation techniques makes little or no difference after a certain threshold.},
keywords={},
doi={10.1093/ietfec/e89-a.1.222},
ISSN={1745-1337},
month={January},}
Copy
TY - JOUR
TI - Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 222
EP - 226
AU - Shinsaku KIYOMOTO
AU - Toshiaki TANAKA
PY - 2006
DO - 10.1093/ietfec/e89-a.1.222
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E89-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2006
AB - This paper reports on an evaluation result of current obfuscation techniques for Java byte code, such as Collberg's techniques in terms of mutational capability, real-time applicability, and program size increase. We suggest effective obfuscation techniques for random and real-time obfuscation (RR obfuscation). In the evaluation results, the combination of some obfuscation techniques was found to be useful for RR obfuscation, and some obfuscation techniques makes little or no difference after a certain threshold.
ER -