Breaking abstractions and unstructuring data structures

115Citations
Citations of this article
43Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To ensure platform independence, mobile programs are distributed in forms that are isomorphic to the original source code. Such codes are easy to decompile, and hence they increase the risk of malicious reverse engineering attacks. Code obfuscation is one of several techniques which has been proposed to alleviate this situation. An obfuscator is a tool which - through the application of code transformations - converts a program into an equivalent one that is more difficult to reverse engineer. In a previous paper [5] we have described the design of a control flow obfuscator for Java. In this paper we extend the design with transformations that obfuscate data structures and abstractions. In particular, we show how to obfuscate classes, arrays, procedural abstractions and built-in data types like strings, integers, and booleans.

Cite

CITATION STYLE

APA

Collberg, C., Thomborson, C., & Low, D. (1998). Breaking abstractions and unstructuring data structures. In Proceedings of the IEEE International Conference on Computer Languages (pp. 28–38). IEEE Comp Soc. https://doi.org/10.1109/ICCL.1998.674154

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free