A Taxonomy of Obfuscating Transformations

A Taxonomy of Obfuscating Transformations,Christian Collberg,Clark Thomborson,Douglas Low

A Taxonomy of Obfuscating Transformations   (Citations: 281)
BibTex | RIS | RefWorks Download
It has become more and more common to distribute software in forms that retain most or all of the information present in the original source code. An important example is Java bytecode. Since such codes are easy to decompile, they increase the risk of malicious reverse engineering attacks. In this paper we review several techniques for technical protection of software secrets. We will argue that automatic code obfuscation is currently the most viable method for preventing reverse engineering....
Published in 1997.
Cumulative Annual
Sort by: