Breaking abstractions and unstructuring data structures

Christian Collberg, Clark Thomborson, Douglas Low

Research output: Chapter in Book/Report/Conference proceedingConference contribution

110 Scopus citations

Abstract

To ensure platform independence, mobile programs are distributed in forms that are isomorphic to the original source code. Such codes are easy to decompile, and hence they increase the risk of malicious reverse engineering attacks. Code obfuscation is one of several techniques which has been proposed to alleviate this situation. An obfuscator is a tool which - through the application of code transformations - converts a program into an equivalent one that is more difficult to reverse engineer. In a previous paper [5] we have described the design of a control flow obfuscator for Java. In this paper we extend the design with transformations that obfuscate data structures and abstractions. In particular, we show how to obfuscate classes, arrays, procedural abstractions and built-in data types like strings, integers, and booleans.

Original languageEnglish (US)
Title of host publicationProceedings of the IEEE International Conference on Computer Languages
Editors Anon
Pages28-38
Number of pages11
DOIs
StatePublished - Jan 1 1998
Externally publishedYes
EventProceedings of the 1998 International Conference on Computer Languages - Chicago, IL, USA
Duration: May 14 1998May 16 1998

Publication series

NameProceedings of the IEEE International Conference on Computer Languages
ISSN (Print)1074-8970

Other

OtherProceedings of the 1998 International Conference on Computer Languages
CityChicago, IL, USA
Period5/14/985/16/98

ASJC Scopus subject areas

  • Software

Fingerprint Dive into the research topics of 'Breaking abstractions and unstructuring data structures'. Together they form a unique fingerprint.

Cite this