International Journal of Modeling and Optimization, 2012
Today reverse engineering poses a serious threat to the protection of intellectual property right... more Today reverse engineering poses a serious threat to the protection of intellectual property rights (IPR) of software developers. The incidents of software tampering and piracy have become commonplace. It is possible for software pirates to extract a piece of code and incorporate it into their own programs with considerable ease. Such cases are even more rampant in the web-based industry since it is teeming with programs in easily decompilable formats. In this paper, we target java applications which are available as Java class files. Java bytecode is platform independent and makes Java executables highly susceptible to being reverse engineered. Obfuscation is a technique to protect against this threat. This paper presents a level-based organization of code obfuscation for employing effective software protection. The authors propose incorporation of obfuscation as a means to improve MIQ of software applications. Finally, the paper demonstrates the working of a code obfuscator that operates on java files and produces obfuscated versions in two stages.
Proceedings of the 4th National Conference; INDIACom-2010 Computing For Nation Development, Febru... more Proceedings of the 4th National Conference; INDIACom-2010 Computing For Nation Development, February 25 26, 2010 Bharati Vidyapeeth's Institute of Computer Applications and Management, New Delhi ... Introducing Machine Intelligence Quotient as a New ...
Today reverse engineering poses a serious threat to the protection of intellectual property right... more Today reverse engineering poses a serious threat to the protection of intellectual property rights (IPR) of software developers. The incidents of software tampering and piracy have become commonplace. It is possible for software pirates to extract a piece of code and incorporate it into their own programs with considerable ease. Such cases are even more rampant in the web-based industry since it is teeming with programs in easily decompilable formats. In this paper, we target java applications which are available as Java class files. Java bytecode is platform independent and makes Java executables highly susceptible to being reverse engineered. Obfuscation is a technique to protect against this threat. This paper presents a level-based organization of code obfuscation for employing effective software protection. The authors propose incorporation of obfuscation as a means to improve MIQ of software applications. Finally, the paper demonstrates the working of a code obfuscator that operates on java files and produces obfuscated versions in two stages.
International Journal of Modeling and Optimization, 2012
Today reverse engineering poses a serious threat to the protection of intellectual property right... more Today reverse engineering poses a serious threat to the protection of intellectual property rights (IPR) of software developers. The incidents of software tampering and piracy have become commonplace. It is possible for software pirates to extract a piece of code and incorporate it into their own programs with considerable ease. Such cases are even more rampant in the web-based industry since it is teeming with programs in easily decompilable formats. In this paper, we target java applications which are available as Java class files. Java bytecode is platform independent and makes Java executables highly susceptible to being reverse engineered. Obfuscation is a technique to protect against this threat. This paper presents a level-based organization of code obfuscation for employing effective software protection. The authors propose incorporation of obfuscation as a means to improve MIQ of software applications. Finally, the paper demonstrates the working of a code obfuscator that operates on java files and produces obfuscated versions in two stages.
Proceedings of the 4th National Conference; INDIACom-2010 Computing For Nation Development, Febru... more Proceedings of the 4th National Conference; INDIACom-2010 Computing For Nation Development, February 25 26, 2010 Bharati Vidyapeeth's Institute of Computer Applications and Management, New Delhi ... Introducing Machine Intelligence Quotient as a New ...
Today reverse engineering poses a serious threat to the protection of intellectual property right... more Today reverse engineering poses a serious threat to the protection of intellectual property rights (IPR) of software developers. The incidents of software tampering and piracy have become commonplace. It is possible for software pirates to extract a piece of code and incorporate it into their own programs with considerable ease. Such cases are even more rampant in the web-based industry since it is teeming with programs in easily decompilable formats. In this paper, we target java applications which are available as Java class files. Java bytecode is platform independent and makes Java executables highly susceptible to being reverse engineered. Obfuscation is a technique to protect against this threat. This paper presents a level-based organization of code obfuscation for employing effective software protection. The authors propose incorporation of obfuscation as a means to improve MIQ of software applications. Finally, the paper demonstrates the working of a code obfuscator that operates on java files and produces obfuscated versions in two stages.
Uploads
Papers by Vriti Sidana