Header menu link for other important links
X
Code security using control flow obfuscation with opaque predicate
R. Senthilkumar,
Published in Research India Publications
2015
Volume: 10
   
Issue: 2
Pages: 3239 - 3250
Abstract
Shielding licensed innovation of source code, has ended up with more challenging tasks. A large portion of the utilized modified languages (C, C++) today utilize a simple to figuring out byte code that incorporate later to a machine code, relying upon the machine that the application is will be run on. One conspicuous strategy to ensure the licensed innovation from figuring out is to scramble the byte code, so just the customer that has the unscrambling key and code to run the applications. The issue with encryption is the need of secret key and key trades; it obliges additional time and asset for unscrambling. So other technique is proposed as Code Obfuscation. The motivation behind a Obfuscation process on a given code, is to make it confused, befuddling and deceive code. The Obfuscation as a thought has a considerable measure of obscurity systems, which will be demonstrated on the Literature Summary segment. Note that Obfuscation a given code, doesn't grantee us that an aggressor won't succeed in decode the code, however the more Obfuscated code, the more troublesome for the pirater to reproduce orginal code. The venture object is to a make an application that for a given C/C++ source code, creates a Obfuscated one that has literally the same usefulness as the first one. © Research India Publications.
About the journal
JournalInternational Journal of Applied Engineering Research
PublisherResearch India Publications
ISSN09734562