• Apr 24, 2017 News! Vol.6, No.4 has been indexed by EI (Inspec).   [Click]
  • Apr 24, 2017 News! Vol.6, No.3 has been indexed by EI (Inspec).   [Click]
  • Jun 26, 2017 News!Vol 7, No 4 has been published with online version 12 original aritcles from 6 countries are published in this issue   [Click]
General Information
    • ISSN: 2010-3697
    • Frequency: Bimonthly
    • DOI: 10.7763/IJMO
    • Editor-in-Chief: Prof. Adrian Olaru
    • Executive Editor: Ms.Yoyo Y. Zhou
    • Abstracting/ Indexing: Engineering & Technology Digital Library, ProQuest, Crossref, Electronic Journals Library, Google Scholar, EI (INSPEC, IET).
    • E-mail ijmo@iacsitp.com
Prof. Adrian Olaru
University Politehnica of Bucharest, Romania
I'm happy to take on the position of editor in chief of IJMO. It's a journal that shows promise of becoming a recognized journal in the area of modelling and optimization. I'll work together with the editors to help it progress.
IJMO 2012 Vol.2(6): 708-711 ISSN: 2010-3697
DOI: 10.7763/IJMO.2012.V2.216

Code Obfuscation for Effectively Securing Data in the Web-Based Industry

Priyanka Singh, Vriti Sidana, Kanu Priya Aggarwal, A. B. Patki, and R. C. Meharde

Abstract—Today reverse engineering poses a serious threat to the protection of intellectual property rights (IPR) of software developers. The incidents of software tampering and piracy have become commonplace. It is possible for software pirates to extract a piece of code and incorporate it into their own programs with considerable ease. Such cases are even more rampant in the web-based industry since it is teeming with programs in easily decompilable formats. In this paper, we target java applications which are available as Java class files. Java bytecode is platform independent and makes Java executables highly susceptible to being reverse engineered. Obfuscation is a technique to protect against this threat. This paper presents a level-based organization of code obfuscation for employing effective software protection. The authors propose incorporation of obfuscation as a means to improve MIQ of software applications. Finally, the paper demonstrates the working of a code obfuscator that operates on java files and produces obfuscated versions in two stages.

Index Terms—Intellectual property rights, machine intelligence quotient (MIQ), obfuscation, reverse engineering, tamper-proofing, watermarking.

Priyanka Singh is with Accenture Services Pvt. Ltd. (e-mail: priyanka.singh059@gmail.com).


Cite: Priyanka Singh, Vriti Sidana, Kanu Priya Aggarwal, A. B. Patki, and R. C. Meharde, "Code Obfuscation for Effectively Securing Data in the Web-Based Industry," International Journal of Modeling and Optimization vol. 2, no. 6, pp. 708-711, 2012.

Copyright © 2008-2015.International Journal of Modeling and Optimization. All rights reserved.
E-mail: ijmo@iacsitp.com