A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Manufacturing cheap, resilient, and stealthy opaque constructs
1998
Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '98
It has become common to distribute software in forms that are isomorphic to the original source code. An important example is Java bytecode. Since such codes are easy to decompile, they increase the risk of mahcious reverse engineering attacks. In thii paper we describe the design of a Java code obfus- &OF, a tool which -through the application of code transformations -converts a Java program into an equivalent one that is more difficuh to reverse engineer. We describe a number of
doi:10.1145/268946.268962
dblp:conf/popl/CollbergTL98
fatcat:s4bxqbtf3zfzfanqaejmbguldm