Results 1 -
5 of
5
An Evaluation of Static Java Bytecode
"... bytecode languages such as Java bytecode and Microsoft’s Common Intermediate Language have made copying, decompiling and disassembling software easier. The global revenue loss due to software piracy was estimated to be more than $50 billion in 2008. Watermarking is a technique which attempts to prot ..."
Abstract
- Add to MetaCart
(Show Context)
bytecode languages such as Java bytecode and Microsoft’s Common Intermediate Language have made copying, decompiling and disassembling software easier. The global revenue loss due to software piracy was estimated to be more than $50 billion in 2008. Watermarking is a technique which attempts to protect software by inserting copyright notices or unique identifiers into software to prove ownership. We evaluate the existing Java static watermarking systems and algorithms by using them to watermark bytecode files and then applying distortive attacks to each watermarked program by obfuscating and optimising. Our study revealed that a high proportion of watermarks were removed as a result of these transformations both in the commercial and academic watermarking systems that we tested. This is further evidence that static watermarking techniques on their own do not give sufficient protection against software piracy.
An Empirical Evaluation of Java Decompilation and Intellectual Property Protection via Software Watermarking
"... Decompilation of Java bytecode is the act of transforming Java bytecode to Java source code. Although easier than that of decompilation of machine code, problems still arise in Java bytecode decompilation. These include type inference of local variables and exception-handling. We evaluate the curren ..."
Abstract
- Add to MetaCart
Decompilation of Java bytecode is the act of transforming Java bytecode to Java source code. Although easier than that of decompilation of machine code, problems still arise in Java bytecode decompilation. These include type inference of local variables and exception-handling. We evaluate the currently available Java bytecode decompilers using an extension of the criteria used in a previous original study. Although there has been a slight improvement since this study, it was found that none passed all of the tests, each of which were designed to target different problem areas. Decompilation and other attacks on software are problems for the software industry, with the global revenue loss due to software piracy estimated to be more than $50 billion in 2008. We present a survey of a specific software protection techniques- software watermarking- in the context of Java decompilers. Software watermarks can be used to prove ownership of stolen software. However, many watermarks are easily removed rendering their protection useless.
Two-Way-Compiler: Additional Data Saving for Generating the Original Source Code of a Binary Program
"... Abstract: The Two-Way-Compiler is an approach to show the equivalence between implemented source code and the generated binary program for safety-related software. A compiler which translates a source code into a binary program and restores the original source code out of the generated binary progra ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract: The Two-Way-Compiler is an approach to show the equivalence between implemented source code and the generated binary program for safety-related software. A compiler which translates a source code into a binary program and restores the original source code out of the generated binary program exactly, like a decompiler, is described. Data that are required to build the original source code back again are especially examined in this paper. Some data are contained in the binary itself and other data lost during compilation. The lost data have to be collected and stored in the binary. With these additional data the decompiler can restore the binary program to the original source code. 1
JAVA DESIGN PATTERN OBFUSCATION by Praneeth Kumar Gone
, 2012
"... This Master's Project is brought to you for free and open access by the Master's Theses and Graduate Research at SJSU ScholarWorks. It has been ..."
Abstract
- Add to MetaCart
(Show Context)
This Master's Project is brought to you for free and open access by the Master's Theses and Graduate Research at SJSU ScholarWorks. It has been