|
advertisement |
|
|
|
|
|
|
Industrial Automatic Control Systems and Controllers Annotation << Back
Protecting the Source Code of the Program
on the Basis of Its Obfuscation |
Filatov V.V.
The article provides a definition of program source code obfuscation, examines existing confusing transformations used for obfuscation, and highlights the criteria for assessing the quality of confusing changes.
A classification of methods of protection software. Methods for protecting software from reverse engineering, as well as methods for the conversion of flow control. Developed diagram of computer simulation by obfuscating the code and chart obfuscations code using some confusing changes.
The source code of fib calculate the n-th member of the Fibonacci sequence in C #.
A proof of the fact that the weakest used confusing transformation affected by the complexity of the data stream, but the conversion is significantly changed the cyclomatic complexity, showing its sensitivity to change.
Keywords: obfuscation; code of program; copyright; intellectual property; protection of the software.
Contacts: E-mail: filv@mail.ru
Pp. 56-61. |
|
|
|
Last news:
Выставки по автоматизации и электронике «ПТА-Урал 2018» и «Электроника-Урал 2018» состоятся в Екатеринбурге Открыта электронная регистрация на выставку Дефектоскопия / NDT St. Petersburg Открыта регистрация на 9-ю Международную научно-практическую конференцию «Строительство и ремонт скважин — 2018» ExpoElectronica и ElectronTechExpo 2018: рост площади экспозиции на 19% и новые формы контент-программы Тематика и состав экспозиции РЭП на выставке "ChipEXPO - 2018" |