Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents
Saved in:
| Title: | Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents |
|---|---|
| Authors: | Sakabe, Yusuke, Soshi, Masakazu, Miyaji, Atsuko |
| Publisher Information: | Springer 2003 |
| Document Type: | Electronic Resource |
| Abstract: | In this paper we propose novel techniques to obfuscate Java programs for developing secure mobile agent systems. Our obfuscation techniques take advantage of polymorphism and exception mechanism of object-oriented languages and can drastically reduce the precision of points-to analysis of the programs. We show that determining precise points-to analysis in obfuscated programs is NP-hard and the fact provides a theoretical basis for our obfuscation techniques. Furthermore, in this paper we present some empirical experiments, whereby we demonstrate the effectiveness of our approaches. Communications and multimedia security : advanced techniques for network and data protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : proceedings / Antonio Lioy, Daniele Mazzocchi (eds.). identifier:https://dspace.jaist.ac.jp/dspace/handle/10119/4446 |
| Index Terms: | mobile agents, security, obfuscation, static analysis, computational complexity, Journal Article, AM |
| URL: | 9783540201854 |
| Availability: | Open access content. Open access content This is the author-created version of Springer, Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji, Lecture Notes in Computer Science, 2828/2003, 2003, 89-103.The original publication is available at www.springerlink.com, http://www.springerlink.com/content/75tyn38kk27q98ln |
| Note: | application/pdf English |
| Other Numbers: | JPNII oai:irdb.nii.ac.jp:01333:0002018276 0302-9743 Lecture Notes in Computer Science, 2828/2003, 89-103 1389637419 |
| Contributing Source: | NATIONAL INST OF INFO From OAIster®, provided by the OCLC Cooperative. |
| Accession Number: | edsoai.on1389637419 |
| Database: | OAIster |
| Abstract: | In this paper we propose novel techniques to obfuscate Java programs for developing secure mobile agent systems. Our obfuscation techniques take advantage of polymorphism and exception mechanism of object-oriented languages and can drastically reduce the precision of points-to analysis of the programs. We show that determining precise points-to analysis in obfuscated programs is NP-hard and the fact provides a theoretical basis for our obfuscation techniques. Furthermore, in this paper we present some empirical experiments, whereby we demonstrate the effectiveness of our approaches.<br />Communications and multimedia security : advanced techniques for network and data protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : proceedings / Antonio Lioy, Daniele Mazzocchi (eds.).<br />identifier:https://dspace.jaist.ac.jp/dspace/handle/10119/4446 |
|---|
Nájsť tento článok vo Web of Science