Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques (Record no. 54962)
[ view plain ]
000 -CABECERA | |
---|---|
campo de control de longitud fija | 01699naa a2200169 a 4500 |
003 - IDENTIFICADOR DEL NÚMERO DE CONTROL | |
campo de control | AR-LpUFIB |
005 - FECHA Y HORA DE LA ÚLTIMA TRANSACCIÓN | |
campo de control | 20250311170354.0 |
008 - DATOS DE LONGITUD FIJA--INFORMACIÓN GENERAL | |
campo de control de longitud fija | 230201nuuuu xx o 000 0 ||| d |
024 8# - Otro identificador estandar | |
Número estándar o código | DIF-M5478 |
-- | DIF005169 |
040 ## - FUENTE DE LA CATALOGACIÓN | |
Centro catalogador/agencia de origen | AR-LpUFIB |
Lengua de catalogación | spa |
Centro/agencia transcriptor | AR-LpUFIB |
100 1# - ENTRADA PRINCIPAL--NOMBRE DE PERSONA | |
Nombre de persona | Parra, Gerardo A. |
245 10 - MENCIÓN DE TÍTULO | |
Título | Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques |
300 ## - DESCRIPCIÓN FÍSICA | |
Extensión | 2008 8 (2) : 71-77 |
520 ## - SUMARIO, ETC. | |
Sumario, etc. | Microsoft’s .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in some cases allows the interaction of several components written in different programming languages. This flexibility is achieved by compiling into an intermediate code which is platform independent. Java is compiled into ByteCode, and Microsoft .NET programs are compiled into MSIL (Microsoft Intermediate Code). However, this flexibility comes with a price. With freeware tools available in Internet, it is quite easy to decompile intermediate codes and obtain a working, readable version of the source code. Obfuscation is the most accepted and commercially available technique that developers can use to protect their intellectual property In this work, we propose the use of try-catch mechanisms available in .NET as a way to improve the quality of one of the building blocks of obfuscation: opaque predicates. Keywords: Obfuscation. Obfuscation Transformation. Opaque Predicates. |
856 40 - LOCALIZACIÓN Y ACCESO ELECTRÓNICOS | |
Identificador Uniforme del Recurso | <a href="journal.info.unlp.edu.ar/journal/journal23/papers/JCST-Jul08-3.pdf">journal.info.unlp.edu.ar/journal/journal23/papers/JCST-Jul08-3.pdf</a> |
942 ## - ELEMENTOS DE PUNTO DE ACCESO ADICIONAL (KOHA) | |
Tipo de ítem Koha | Capítulo de libro |
No items available.