Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques (Record no. 54962)

MARC details
000 -CABECERA
campo de control de longitud fija 01699naa a2200169 a 4500
003 - IDENTIFICADOR DEL NÚMERO DE CONTROL
campo de control AR-LpUFIB
005 - FECHA Y HORA DE LA ÚLTIMA TRANSACCIÓN
campo de control 20250311170354.0
008 - DATOS DE LONGITUD FIJA--INFORMACIÓN GENERAL
campo de control de longitud fija 230201nuuuu xx o 000 0 ||| d
024 8# - Otro identificador estandar
Número estándar o código DIF-M5478
-- DIF005169
040 ## - FUENTE DE LA CATALOGACIÓN
Centro catalogador/agencia de origen AR-LpUFIB
Lengua de catalogación spa
Centro/agencia transcriptor AR-LpUFIB
100 1# - ENTRADA PRINCIPAL--NOMBRE DE PERSONA
Nombre de persona Parra, Gerardo A.
245 10 - MENCIÓN DE TÍTULO
Título Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques
300 ## - DESCRIPCIÓN FÍSICA
Extensión 2008 8 (2) : 71-77
520 ## - SUMARIO, ETC.
Sumario, etc. Microsoft’s .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in some cases allows the interaction of several components written in different programming languages. This flexibility is achieved by compiling into an intermediate code which is platform independent. Java is compiled into ByteCode, and Microsoft .NET programs are compiled into MSIL (Microsoft Intermediate Code). However, this flexibility comes with a price. With freeware tools available in Internet, it is quite easy to decompile intermediate codes and obtain a working, readable version of the source code. Obfuscation is the most accepted and commercially available technique that developers can use to protect their intellectual property In this work, we propose the use of try-catch mechanisms available in .NET as a way to improve the quality of one of the building blocks of obfuscation: opaque predicates. Keywords: Obfuscation. Obfuscation Transformation. Opaque Predicates.
856 40 - LOCALIZACIÓN Y ACCESO ELECTRÓNICOS
Identificador Uniforme del Recurso <a href="journal.info.unlp.edu.ar/journal/journal23/papers/JCST-Jul08-3.pdf">journal.info.unlp.edu.ar/journal/journal23/papers/JCST-Jul08-3.pdf</a>
942 ## - ELEMENTOS DE PUNTO DE ACCESO ADICIONAL (KOHA)
Tipo de ítem Koha Capítulo de libro

No items available.