Java Automatic Identifier Renaming Technique and Protection Method 


Vol. 40,  No. 4, pp. 709-719, Apr.  2015


PDF
  Abstract

This paper introduces a proper renaming service using variable action and security services against the analysis techniques in Java code. The renaming service that is introduced is separated into API pattern and loop condition. We present our scheme algorithm with known Java obfuscation techniques and tools in order to help readers understanding, and implement prototype to prove practicality in this paper. Test result using prototype shows 73% successful variable renaming rate. Using our scheme, cooperators can intuitionally understand all of code. Also, It helps malware analysts to predict malware action by variable name. But application source code that is developed by Java is exposed to hackers easily using our scheme. So we introduce Java application code protection methods, too.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

J. Kim, S. Hong, N. Go, W. Lee, Y. Park, "Java Automatic Identifier Renaming Technique and Protection Method," The Journal of Korean Institute of Communications and Information Sciences, vol. 40, no. 4, pp. 709-719, 2015. DOI: .

[ACM Style]

Ji-yun Kim, Soo-hwa Hong, Nam-hyeon Go, Woo-Seung Lee, and Yong-su Park. 2015. Java Automatic Identifier Renaming Technique and Protection Method. The Journal of Korean Institute of Communications and Information Sciences, 40, 4, (2015), 709-719. DOI: .

[KICS Style]

Ji-yun Kim, Soo-hwa Hong, Nam-hyeon Go, Woo-Seung Lee, Yong-su Park, "Java Automatic Identifier Renaming Technique and Protection Method," The Journal of Korean Institute of Communications and Information Sciences, vol. 40, no. 4, pp. 709-719, 4. 2015.