Array Data Transformation for Source Code Obfuscation

Obfuscation is a low cost software protection methodology to avoid reverse engineering and re engineering of applications. Source code obfuscation aims in obscuring the source code to hide the functionality of the codes. This paper proposes an Array data transformation in order to obfuscate the source code which uses arrays. The applications using the proposed data structures force the programmer to obscure the logic manually. It makes the developed obscured codes hard to reverse engineer and also protects the functionality of the codes.




References:
[1] Markus Dahm, ÔÇÿByte Code Engineering with the BCEL API- Technical
Report B-17-98, April 3, 2001.
[2] Arjan de Roo, Leon van den Oord, ÔÇÿStealthy obfuscation techniques:
misleading the pirates-, Department of Computer Science, University of
Twente Enschede, The Netherlands.
[3] Sharath.K.Udupa.Saumya K.Debray,Matias Madou, ÔÇÿDeobfuscation-
Reverse Engineering obfuscated Code-, Proceedings of the 12th
Working Conference on Reverse Engineering (WCRE-05).
[4] Christian Collberg, Ginger Myles, Michael Stepp, ÔÇÿAn Empirical Study
of Java Bytecode Programs-,Department of Computer Science,
University of Arizona.
[5] Christian Collberg Clark Thomborson Douglas Low, ÔÇÿBreaking
Abstractions and Unstructuring Data Structures-,Department of
Computer Science,The University of Auckland.
[6] Madou, M.; Anckaert, B.; De Bus,De Bosschere, K.; Cappaert, J.;
Preneel, B.;ÔÇÿOn the Effectiveness of Source Code Transformations for
Binary Obfuscation-, Proc. of the International Conference on Software
Engineering Research and Practice (SERP06), June. 2006.
[7] Christian Collberg, Clark Thomborson, and Douglas Low, ÔÇÿA Taxonomy
of obfuscating Transformations-, Report 148, Department of Computer
Science, University of Auckland, July 1997.
[8] C. Collberg and C. Thomborson, ÔÇÿWatermarking,Tamper-proofing, and
obfuscation - tools for software protection-, IEEE Transactions on
Software Engineering, Vol. 28,pp. 735-746, August 2002.
[9] L. Ertaul, S. Venkatesh, ÔÇÿNovel Obfuscation Algorithms for Software
Security-, Proceedings of the 2005 International Conference on Software
Engineering Research and Practice, SERP-05, June, Las Vegas.
[10] Ira D. Baxter,Michael Mehlich, ÔÇÿReverse Engineering is Reverse
Forward Engineering-, Proceedings of Fourth Working Conference on
Reverse Engineering, 1997.