Java Automatic Identifier Renaming Technique and Protection Method
نویسندگان
چکیده
منابع مشابه
Overcoming the obfuscation of Java programs by identifier renaming
Decompilation is the process of translating object code to source code and is usually the first step towards the reverse-engineering of an application. Many obfuscation techniques and tools have been developed, with the aim of modifying a program, such that its functionalities are preserved, while its understandability is compromised for a human reader or the decompilation is made unsuccessful....
متن کاملAnalysing Java identifier names
Identifier names are the principal means of recording and communicating ideas in source code and are a significant source of information for software developers and maintainers, and the tools that support their work. This research aims to increase understanding of identifier name content types — words, abbreviations, etc. — and phrasal structures — noun phrases, verb phrases, etc. — by improvin...
متن کاملObject-Oriented Identifier Renaming Correction in Three-Way Merge
There are two traditional concurrency models among the source code management (SCM) systems: lock and merge models. The lock model prevents the concurrent modification on the same files, but the merge model allows the parallel editing, and performs a merge to reconcile the changes. A three-way merge engine is a usual part of SCM systems, some of them attempt to auto-merge the files, but sometim...
متن کاملUnique Renaming of Java Using Source Transformation
This paper presents a method for unique renaming declarations and references in Java programs using source transformation to XML markup. Each entity declaration and reference in the Java program is assigned a globally unique identifier (UID) based on its declaration scope and file. The UID serves as a key by which the entity's original declaration and all references can be found, and more impor...
متن کاملStack Renaming of the Java Virtual
This study proposes a scheme to map the operand stack of the Java Virtual Machine to hardware registers and evaluates the performance beneets of the proposed scheme. Using the technique of register renaming while mapping the stack to registers , we are able to exploit the inherent parallelism in the instruction stream. The simulation results conducted show an improvement of about 15%-26% for th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Korean Institute of Communications and Information Sciences
سال: 2015
ISSN: 1226-4717
DOI: 10.7840/kics.2015.40.4.709