Title :
Securing Java-Based Mobile Agents through Byte Code Obfuscation Techniques
Author :
Shah, Syed Waqar ; Nixon, P. ; Ferguson, R.I. ; Hassnain, Syed Riaz ul ; Arbab, M. Naeem ; Khan, Laiq
Author_Institution :
Dept. of Electr. Eng., N.W.F.P UET, Peshawar
Abstract :
Mobile agents have the ability to relocate computation and then carry communication with their peers locally. The design and implementation of mechanism to relocate computations requires a careful assessment of security issues. If these issues are not addressed properly, mobile agent technology cannot be used to implement real-world applications. To address such issues this paper proposes two code obfuscation techniques (Memon at el., 2006) for Java-based mobile agents that are compiled into a platform independent byte code format. These techniques involve applying obfuscating transformations to the mobile agent´s byte code in order to protect them against malicious attacks. Consequently these techniques prevent automatic software analysis tools, De-compilers, from generating correct source code by introducing syntax and semantic errors in the generated source code. The proposed techniques are applied on sample mobile agent´s class files to examine the effectiveness of the techniques in impeding reverse engineering. After obtaining the results, we will reveal the erroneous codes generated by the tested de-compilers
Keywords :
Java; compiler generators; mobile agents; security of data; Java; automatic software analysis tools; byte code obfuscation; decompilers; erroneous codes; malicious attacks; mobile agents; obfuscating transformations; security; Error correction codes; Impedance; Java; Mobile agents; Mobile communication; Peer to peer computing; Protection; Reverse engineering; Security; Software tools; Java; mobile agents; obfuscation; security;
Conference_Titel :
Multitopic Conference, 2006. INMIC '06. IEEE
Conference_Location :
Islamabad
Print_ISBN :
1-4244-0795-8
Electronic_ISBN :
1-4244-0795-8
DOI :
10.1109/INMIC.2006.358182