Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents

Saved in:
Bibliographic Details
Title: Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents
Authors: Sakabe, Yusuke, Soshi, Masakazu, Miyaji, Atsuko
Publisher Information: Springer 2003
Document Type: Electronic Resource
Abstract: In this paper we propose novel techniques to obfuscate Java programs for developing secure mobile agent systems. Our obfuscation techniques take advantage of polymorphism and exception mechanism of object-oriented languages and can drastically reduce the precision of points-to analysis of the programs. We show that determining precise points-to analysis in obfuscated programs is NP-hard and the fact provides a theoretical basis for our obfuscation techniques. Furthermore, in this paper we present some empirical experiments, whereby we demonstrate the effectiveness of our approaches.
Communications and multimedia security : advanced techniques for network and data protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : proceedings / Antonio Lioy, Daniele Mazzocchi (eds.).
identifier:https://dspace.jaist.ac.jp/dspace/handle/10119/4446
Index Terms: mobile agents, security, obfuscation, static analysis, computational complexity, Journal Article, AM
URL: http://hdl.handle.net/10119/4446
https://dspace.jaist.ac.jp/dspace/bitstream/10119/4446/1/73-25.pdf
https://doi.org/10.1007/b13863
9783540201854
https://doi.org/10.1007/b13863
Availability: Open access content. Open access content
This is the author-created version of Springer, Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji, Lecture Notes in Computer Science, 2828/2003, 2003, 89-103.The original publication is available at www.springerlink.com, http://www.springerlink.com/content/75tyn38kk27q98ln
Note: application/pdf
English
Other Numbers: JPNII oai:irdb.nii.ac.jp:01333:0002018276
0302-9743
Lecture Notes in Computer Science, 2828/2003, 89-103
1389637419
Contributing Source: NATIONAL INST OF INFO
From OAIster®, provided by the OCLC Cooperative.
Accession Number: edsoai.on1389637419
Database: OAIster
Description
Abstract:In this paper we propose novel techniques to obfuscate Java programs for developing secure mobile agent systems. Our obfuscation techniques take advantage of polymorphism and exception mechanism of object-oriented languages and can drastically reduce the precision of points-to analysis of the programs. We show that determining precise points-to analysis in obfuscated programs is NP-hard and the fact provides a theoretical basis for our obfuscation techniques. Furthermore, in this paper we present some empirical experiments, whereby we demonstrate the effectiveness of our approaches.<br />Communications and multimedia security : advanced techniques for network and data protection : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003 : proceedings / Antonio Lioy, Daniele Mazzocchi (eds.).<br />identifier:https://dspace.jaist.ac.jp/dspace/handle/10119/4446