Title :
A Framework for Mobile Phone Java Software Protection
Author :
Zhang, Xuesong ; He, Fengling ; Zuo, Wanli
Author_Institution :
Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun
Abstract :
Illegal distribution and use of software is a big ad hoc problem in software industry today, especially on the growing market of mobile software products: the lack of protection may be the most important setback of the expansion of this market. In this paper we present our copy protection scheme targeting primarily mobile phone Java applications, which combines techniques of obfuscation, diversity and tamper-proofing. Instead of obfuscating the program itself , we choose to obfuscate the program interpretation. Each set of permutation rules are combined with one SIM card number, and used as the auxiliary input to a Java Virtual Machine when the program is executed. The obfuscated interpretation enables us to hide functionality of a given program P unless the permutation being taken is revealed. The permutation space is sufficiently large, which ensure successful attacks on one´s embedded copyright protection mechanism cannot be generalized successfully to other installed copies. Experimental result shows that there is little influence to the file size and execution efficiency.
Keywords :
Java; ad hoc networks; copyright; mobile computing; software engineering; Java software protection; Java virtual machine; SIM card number; ad hoc problem; copy protection scheme; copyright protection; illegal distribution; mobile phone; mobile software products; program interpretation; software industry; tamper-proofing; Application software; Computer science; Educational institutions; Helium; Information technology; Java; Mobile handsets; Reverse engineering; Software protection; Virtual machining; Java Bytecode; Mobile phone; Obfuscation; Software protection;
Conference_Titel :
Convergence and Hybrid Information Technology, 2008. ICCIT '08. Third International Conference on
Conference_Location :
Busan
Print_ISBN :
978-0-7695-3407-7
DOI :
10.1109/ICCIT.2008.98