dc.contributor | 資科系 | |
dc.creator (作者) | Chen, Kung;Chen, Ju-Bing | |
dc.creator (作者) | 陳恭 | zh_TW |
dc.date (日期) | 2007 | |
dc.date.accessioned | 17-Jun-2015 15:44:58 (UTC+8) | - |
dc.date.available | 17-Jun-2015 15:44:58 (UTC+8) | - |
dc.date.issued (上傳時間) | 17-Jun-2015 15:44:58 (UTC+8) | - |
dc.identifier.uri (URI) | http://nccur.lib.nccu.edu.tw/handle/140.119/75898 | - |
dc.description.abstract (摘要) | Code obfuscators are widely used tools for protecting commercial Java software. Advanced obfuscation techniques make de-compiled Java programs not re-compilable, thus greatly raising the barrier of instrumenting Java bytecode for malicious purpose. However, we have found that the aspect-oriented programming language AspectJ can be abused to overcome advanced code obfuscation and to modify obfuscated Java software effectively using its bytecode instrumentation mechanism. This paper describes such issues and reports our experiment results. We argue that the simplicity and very low cost of such malicious aspects make them worth wider attention from the Java and AspectJ community. | |
dc.format.extent | 92023 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.relation (關聯) | SESS `06 Proceedings of the 2006 international workshop on Software engineering for secure systems Pages 19-26 | |
dc.subject (關鍵詞) | Software protection; Java; Code obfuscation; AspectJ; Aspectoriented; programming | |
dc.title (題名) | On instrumenting obfuscated java bytecode with aspects | |
dc.type (資料類型) | article | en |
dc.identifier.doi (DOI) | 10.1145/1137627.1137632 | |
dc.doi.uri (DOI) | http://dx.doi.org/10.1145/1137627.1137632 | |