메뉴 건너뛰기




Volumn 4420 LNCS, Issue , 2007, Pages 96-110

Obfuscating Java: The most pain for the least gain

Author keywords

[No Author keywords available]

Indexed keywords

BENCHMARKING; BINARY CODES; COMPUTATIONAL COMPLEXITY; COMPUTER GRAPHICS; REVERSE ENGINEERING; SEMANTICS;

EID: 34948902663     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71229-9_7     Document Type: Conference Paper
Times cited : (21)

References (21)
  • 3
    • 0025400314 scopus 로고
    • An empirical study of the use of the goto statement
    • B. A. Benander, N. Gorla, and A. C. Benander. An empirical study of the use of the goto statement. J. Syst. Softw., 11(3):217-223, 1990.
    • (1990) J. Syst. Softw , vol.11 , Issue.3 , pp. 217-223
    • Benander, B.A.1    Gorla, N.2    Benander, A.C.3
  • 4
    • 0028446078 scopus 로고
    • A metrics suite for object oriented design
    • S. R. Chidamber and C. F. Kemerer. A metrics suite for object oriented design. IEEE Trans. Softw. Eng., 20(6):476-493, 1994.
    • (1994) IEEE Trans. Softw. Eng , vol.20 , Issue.6 , pp. 476-493
    • Chidamber, S.R.1    Kemerer, C.F.2
  • 5
    • 0027684663 scopus 로고
    • Operating system protection through program evolution
    • F. B. Cohen. Operating system protection through program evolution. Comput. Secur., 12(6):565-584, 1993.
    • (1993) Comput. Secur , vol.12 , Issue.6 , pp. 565-584
    • Cohen, F.B.1
  • 7
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation - tools for software protection
    • Aug
    • C. S. Collberg and C. Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. In IEEE Transactions on Software Engineering, volume 28, pages 735-746, Aug. 2002.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , pp. 735-746
    • Collberg, C.S.1    Thomborson, C.2
  • 11
    • 0019613747 scopus 로고
    • Software structure metrics based on information flow
    • S. Henry and K. Kafura. Software structure metrics based on information flow. IEEE Transactions on Software Engineering, 7(5):510-518, 1981.
    • (1981) IEEE Transactions on Software Engineering , vol.7 , Issue.5 , pp. 510-518
    • Henry, S.1    Kafura, K.2
  • 13
    • 84959039621 scopus 로고    scopus 로고
    • Decompiling Java bytecode: Problems, traps and pit-falls
    • R. N. Horspool, editor, Compiler Construction, of, Springer Verlag
    • J. Miecnikowski and L. J. Hendren. Decompiling Java bytecode: problems, traps and pit-falls. In R. N. Horspool, editor, Compiler Construction, volume 2304 of Lecture Notes in Computer Science, pages 111-127. Springer Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2304 , pp. 111-127
    • Miecnikowski, J.1    Hendren, L.J.2
  • 15
    • 84860073015 scopus 로고    scopus 로고
    • Available on
    • Mocha, the Java Decompiler. Available on: http://www.brouhaha.com/~eric/ computers/mocha.html.
    • Mocha, the Java Decompiler
  • 16
    • 0027554366 scopus 로고
    • Measurement of data structure complexity
    • J. C. Munson and T. M. Khoshgoftaar. Measurement of data structure complexity. J. Syst. Softw., 20(3):217-225, 1993.
    • (1993) J. Syst. Softw , vol.20 , Issue.3 , pp. 217-225
    • Munson, J.C.1    Khoshgoftaar, T.M.2
  • 18
    • 35248814855 scopus 로고    scopus 로고
    • Java obfuscation with a theoretical basis for building secure mobile agents
    • Y. Sakabe, M. Soshi, and A. Miyaji. Java obfuscation with a theoretical basis for building secure mobile agents. In Communications and Multimedia Security, pages 89-103, 2003.
    • (2003) Communications and Multimedia Security , pp. 89-103
    • Sakabe, Y.1    Soshi, M.2    Miyaji, A.3
  • 20
    • 37149049202 scopus 로고    scopus 로고
    • Source Again, A Java Decompiler. Available on
    • Source Again - A Java Decompiler. Available on: http://www.ahpah.com/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.