Home   >   CSC-OpenAccess Library   >    Manuscript Information
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
Adwan Fakhri Yasin, Ihab Nasra
Pages - 140 - 160     |    Revised - 31-08-2016     |    Published - 01-10-2016
Volume - 10   Issue - 4    |    Publication Date - October 2016  Table of Contents
MORE INFORMATION
KEYWORDS
Software Obfuscation, Reverse Engineering, Byte Code, Java Reflection, De-compiler.
ABSTRACT
Several obfuscation tools and software are available for Java programs but larger part of these software and tools just scramble the names of the classes or the identifiers that stored in a bytecode by replacing the identifiers and classes names with meaningless names. Unfortunately, these tools are week, since the java, compiler and java virtual machine (JVM) will never load and execute scrambled classes. However, these classes must be decrypted in order to enable JVM loaded them, which make it easy to intercept the original bytecode of programs at that point, as if it is not been obfuscated. In this paper, we presented a dynamic obfuscation technique for java programs. In order to deter reverse engineers from de-compilation of software, this technique integrates three levels of obfuscation, source code, lexical transformation and the data transformation level in which we obfuscate the data structures of the source code and byte-code transformation level. By combining these levels, we achieved a high level of code confusion, which makes the understanding or decompiling the java programs very complex or infeasible. The proposed technique implemented and tested successfully by many Java de-compilers, like JV, CAVJ, DJ, JBVD and AndroChef. The results show that all decompiles are deceived by the proposed obfuscation technique.
1 Google Scholar 
2 refSeek 
3 Scribd 
4 SlideShare 
5 PdfSR 
É. Tanter a, R. Toledo a, G. Pothier a, J. Noyéb, "Flexible metaprogramming and AOP in Java". Science of Computer Programming 72 (2008) 22-30.
E. E. Ogheneovo and C.K. Oputeh, "Source Code Obfuscation: A Technique for Checkmating Software Reverse Engineering". International Journal of Engineering Science Invention ISSN (Online): 2319-6734, ISSN (Print): 2319-6726 www.ijesi.org Volume 3 Issue 5? May 2014 ? PP.01-10.
F. BUZATU, "Methods for Obfuscating Java Programs". Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 1, 2012, ISSN 2067-4074
F. BUZATU, "Methods for Obfuscating Java Programs. Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 1, 2012,ISSN 2067-4074
H.Chen, L.Yuan, B.Huang, P.Yew. "Control Flow Obfuscation with Information Flow Tracking", MICRO 42 Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture,Pages 391-400 , ACM New York, NY, USA (2009).
I. Popov, S. Debray, and G. Andrews, "Binary obfuscation using signals," in Proc. of 16th USENIX Security Symposium on USENIX Security Symposium table of contents, USENIX Association Berkely, CA, USA, 2007.
I. Welch and R. J. Stroud, "Kava - A Reflective Java based on Bytecode Rewriting",ACM, Proceedings of the 1st OOPSLA Workshop on Reflection and Software Engineering: Reflection and Software Engineering, Papers from OORaSE 1999, Pages 155-167 Springer-Verlag London, ISBN:3-540-67761-5,200.
J. MacBride, C. Mascioli, S. Marks, Y. Tang, L.M. Head, and R., P. Ramachandran. "A COMPARATIVE STUDY OF JAVA OBFUSCATORS". Proceeding of the Nith IASTED International Conference SOFTWARE ENGENEERING AND APPLICATION, November 14-16, 2005, Phoenix, AZ, USA.
J.M. Memon, S. Arfeen, A. Mughal, F. Memon, "Preventing Reverse Engineering Threat in Java Using Byte Code Obfuscation Techniques". 2nd International Conference on Emerging Technologies, IEE, Peshawar, Pakistan 13-14 November 2006.
J.T. Chan and W. Yang, "Advanced obfuscation techniques for java bytecode," Journal of systems and software, Vol. 71, 2004.
L. Ertaul and S.Venkatesh. "Novel Obfuscation Algorithms for Software Security". Proceedings of the 2005 International Conference on Software Engineering Research and Practice, SERP'05, June, Las Vegas, June, (2005).
M. Garci, "Runtime metaprogramming via java.lang.invoke.MethodHandle". LAMP, EPFL, 2012, http://lamp.epfl.ch/~magarcia.
M. Madou, B. Anckaert, P. Moseley, S. Debray, B. De Sutter, K. De Bosschere, "Software Protection Through Dynamic Code Mutation, "LECTURE NOTES IN COMPUTER SCIENCE 3786, 2006, 194.
M. Popa, "Techniques of Program Code Obfuscation for Secure Software. Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 4, 2011, ISSN 2067 - 4074.
N. Jeenjun S. Khuntaweetep and S. Somkuarnpanit. "Byte code Interpreter for 8051 Microcontroller". Proceeding of the International Multi Conference of Engineers and Computer Scientists, 2010 Vol II, IMECS 2010, March 17-19, 2010, Hong King.
P. Sivadasan, P .S. Lal, N. Sivadasan, "JConstHide: A Framework for Java Source Code Constant Hiding". Journal of Information Assurance and Security 4 (2009) 21-29.
P.Sivadasan and P.Sojan Lal. "ARRAY BASED JAVA SOURCE CODE OBFUSCATION USING CLASSES WITH RESTRUCTURED ARRAYS", CoRR (2008).
S. Andrivet, "C++11 metaprogramming applied to software obfuscation". Black Hat Europe conference, Amsterdam ,2014
S. Treadwell, M. Zhou, "A Heuristic Approach for Detection of Obfuscated Malware". 978-1- 4244-4173-0/09/$25.00. © 2009 IEEE.
S.Schrittwieser and S.Katzenbeisser. "Code Obfuscation against Static and Dynamic Reverse Engineering", IH'11 Proceedings of the 13th international conference on Information hiding,Pages 270-284 ,Springer-Verlag Berlin, Heidelberg (2011).
V. Balachandran and S. Emmanuel, "Software Code Obfuscation by Hiding Control Flow". IEEE, 978-1-4577-1019-3/11/$26.00, 2011.
W. Dingab, Z. Gua, F. Gaoa, "Reconstruction of Data Type in Obfuscated Binary Programs". ICACT, ISBN 978-89-968650-3-2, 2014.
W. Miao, J. Broberg and J. Siek, "Compile-time Reflection and Metaprogramming for Java". ACM, 978-1-4503-2619-3/14/01. . . $15.00,2014
X. Yao, J. Pang, Y. Zhang, Y. Yu, J. Lu, "A Method and implementation of control flow obfuscation using SEH". Fourth International Conference on Multimedia Information Networking and Security, IEEE, 978-0-7695-4852-4/12 $26.00, 2012
Associate Professor Adwan Fakhri Yasin
Arab American University - Palestinian Occupied Territori
adwanaa@yahoo.com
Mr. Ihab Nasra
Arab American University - Palestinian Occupied Territori


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS