Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2007, Vol. 30 ›› Issue (6): 103-106.doi: 10.13190/jbupt.200706.103.031

• Reports • Previous Articles     Next Articles

Manufacture of a New Opaque Predicate for Java Programs

YUAN Zheng1,2, 3 , FENG Yan1, WEN Qiao-yan3, ZHANG Hua3   

  1. ( 1. Department of information security, Beijing Electronic Science and Technology Institute, Beijing 100070,China; 2. The Center for Advanced Study, Tsinghua University,Beijing 100084,China; 3. School of Science, Beijing University of Posts and Telecommunications, Beijing100876,China)
  • Received:2007-01-01 Revised:2007-10-09 Online:2007-12-31 Published:2007-12-31
  • Contact: YUAN Zheng

Abstract:

Most of developers protect their Java programs by code obfuscation, and opaque predicates act as tools for obfuscating control flow logic embedded within code. A new method of using congruent equation to construct a family of opaque predicates for Java programs is presented. Additionally, key and Diophantine equation is first exploited for estimating output of opaque predicates. The opaque predicates are trapdoor one-way being more resilient, stealthier and cheaper. The opaque predicates are dynamic and secure against all usual types of static attacks and dynamic attacks, and also secure against cryptanalysis.

Key words: Java obfuscating, opaque predicates, congruential equation, Diophantine equation

CLC Number: