Two Control Computation Transformation Methods for Obfuscating Java Soft Software

H-Y. Chen and T-W. Hou (Taiwan)


reverse engineering attacks, obfuscation, Java, decompiler


Protection of Java code from malicious modifications is an important issue. A defense against reverse engineering is obfuscation. Two control flow obfuscation methods for protecting Java code at the bytecode level are proposed. They are no initial variable obfuscation (NIVO) and breaking for-loop obfuscation (BFLO). The new methods were tested against the decompiler Jad. Both the no initial variable obfuscation and the breaking for-loop obfuscation successfully defeated the decompiler Jad.

Important Links:

Go Back