Array Data Transformation for Source Code Obfuscation
Obfuscation is a low cost software protection
methodology to avoid reverse engineering and re engineering of
applications. Source code obfuscation aims in obscuring the source
code to hide the functionality of the codes. This paper proposes an
Array data transformation in order to obfuscate the source code
which uses arrays. The applications using the proposed data
structures force the programmer to obscure the logic manually. It
makes the developed obscured codes hard to reverse engineer and
also protects the functionality of the codes.
[1] Markus Dahm, ÔÇÿByte Code Engineering with the BCEL API- Technical
Report B-17-98, April 3, 2001.
[2] Arjan de Roo, Leon van den Oord, ÔÇÿStealthy obfuscation techniques:
misleading the pirates-, Department of Computer Science, University of
Twente Enschede, The Netherlands.
[3] Sharath.K.Udupa.Saumya K.Debray,Matias Madou, ÔÇÿDeobfuscation-
Reverse Engineering obfuscated Code-, Proceedings of the 12th
Working Conference on Reverse Engineering (WCRE-05).
[4] Christian Collberg, Ginger Myles, Michael Stepp, ÔÇÿAn Empirical Study
of Java Bytecode Programs-,Department of Computer Science,
University of Arizona.
[5] Christian Collberg Clark Thomborson Douglas Low, ÔÇÿBreaking
Abstractions and Unstructuring Data Structures-,Department of
Computer Science,The University of Auckland.
[6] Madou, M.; Anckaert, B.; De Bus,De Bosschere, K.; Cappaert, J.;
Preneel, B.;ÔÇÿOn the Effectiveness of Source Code Transformations for
Binary Obfuscation-, Proc. of the International Conference on Software
Engineering Research and Practice (SERP06), June. 2006.
[7] Christian Collberg, Clark Thomborson, and Douglas Low, ÔÇÿA Taxonomy
of obfuscating Transformations-, Report 148, Department of Computer
Science, University of Auckland, July 1997.
[8] C. Collberg and C. Thomborson, ÔÇÿWatermarking,Tamper-proofing, and
obfuscation - tools for software protection-, IEEE Transactions on
Software Engineering, Vol. 28,pp. 735-746, August 2002.
[9] L. Ertaul, S. Venkatesh, ÔÇÿNovel Obfuscation Algorithms for Software
Security-, Proceedings of the 2005 International Conference on Software
Engineering Research and Practice, SERP-05, June, Las Vegas.
[10] Ira D. Baxter,Michael Mehlich, ÔÇÿReverse Engineering is Reverse
Forward Engineering-, Proceedings of Fourth Working Conference on
Reverse Engineering, 1997.
[1] Markus Dahm, ÔÇÿByte Code Engineering with the BCEL API- Technical
Report B-17-98, April 3, 2001.
[2] Arjan de Roo, Leon van den Oord, ÔÇÿStealthy obfuscation techniques:
misleading the pirates-, Department of Computer Science, University of
Twente Enschede, The Netherlands.
[3] Sharath.K.Udupa.Saumya K.Debray,Matias Madou, ÔÇÿDeobfuscation-
Reverse Engineering obfuscated Code-, Proceedings of the 12th
Working Conference on Reverse Engineering (WCRE-05).
[4] Christian Collberg, Ginger Myles, Michael Stepp, ÔÇÿAn Empirical Study
of Java Bytecode Programs-,Department of Computer Science,
University of Arizona.
[5] Christian Collberg Clark Thomborson Douglas Low, ÔÇÿBreaking
Abstractions and Unstructuring Data Structures-,Department of
Computer Science,The University of Auckland.
[6] Madou, M.; Anckaert, B.; De Bus,De Bosschere, K.; Cappaert, J.;
Preneel, B.;ÔÇÿOn the Effectiveness of Source Code Transformations for
Binary Obfuscation-, Proc. of the International Conference on Software
Engineering Research and Practice (SERP06), June. 2006.
[7] Christian Collberg, Clark Thomborson, and Douglas Low, ÔÇÿA Taxonomy
of obfuscating Transformations-, Report 148, Department of Computer
Science, University of Auckland, July 1997.
[8] C. Collberg and C. Thomborson, ÔÇÿWatermarking,Tamper-proofing, and
obfuscation - tools for software protection-, IEEE Transactions on
Software Engineering, Vol. 28,pp. 735-746, August 2002.
[9] L. Ertaul, S. Venkatesh, ÔÇÿNovel Obfuscation Algorithms for Software
Security-, Proceedings of the 2005 International Conference on Software
Engineering Research and Practice, SERP-05, June, Las Vegas.
[10] Ira D. Baxter,Michael Mehlich, ÔÇÿReverse Engineering is Reverse
Forward Engineering-, Proceedings of Fourth Working Conference on
Reverse Engineering, 1997.
@article{"International Journal of Information, Control and Computer Sciences:51672", author = "S. Praveen and P. Sojan Lal", title = "Array Data Transformation for Source Code Obfuscation", abstract = "Obfuscation is a low cost software protection
methodology to avoid reverse engineering and re engineering of
applications. Source code obfuscation aims in obscuring the source
code to hide the functionality of the codes. This paper proposes an
Array data transformation in order to obfuscate the source code
which uses arrays. The applications using the proposed data
structures force the programmer to obscure the logic manually. It
makes the developed obscured codes hard to reverse engineer and
also protects the functionality of the codes.", keywords = "Reverse Engineering, Source Code Obfuscation.", volume = "1", number = "12", pages = "3799-5", }