A Survey on Program Code Obfuscation Technique
Downloads
Program code are distributed through internet and suffering from the program theft. Means a program is sold to user and user make own copyright of program called program theft. This is happen because program are easily decomposed into reusable class file and also decomposed into source code by the program users. In this paper practical work show that theft program can easily findable and also proposed a method that shows that if starts working on the method theft program are easily findable. Original developer of program can easily find the program theft and one another technique is watermarking technique that is also a successful technique help the original developer of program to finding program theft, some concept of watermarking also discuss in this paper. With the help of this paper people knows the actual power and use of obfuscator technique. Experimental result in the paper show that approach work successfully.
https://de.wikipedia.org/wiki/Obfuskation.
Kumar, Gaurav. "Novel Method and Procedure for System Security."International Journal of Advance Engineering and Global Technology 3 (2015).
Jan Capparat. “Code Obfuscation technique for Software Protection” Pdf.
https://en.wikipedia.org/wiki/Digital_watermarking.
Frank Y. Shih: Digital watermarking and steganography: fundamentals and techniques. Taylor & Francis, Boca Raton, FL, USA.
Kumar, Gaurav. "Best Plan for System Security." International Journal of Advance Research in Computer Science & Technology 3 (2015).
Volume 3 2015.
http://www.webopedia.com/TERM/D/digital_watermark.html
Akito Monden, Hajimu Iida, Ken-ichi-Matsumoto, Katsuro Inoue, Kojji Torri, “A practical Method for Watermarking Java Program” on 24 computer science and application conference compsac 2000.
Richard R. Brooks: Disruptive Security Technologies with Mobile Code and peer-to-peer networks. CRC Press,14th May 2012, 7, p 155ff.
http://javascript-source.com/.
http://proguard.sourceforge.net/results.html
https://msdn.microsoft.com/en-Us/library/ms227229(v=vs.80).aspx
Kumar, Gaurav. "SKInternational Journal of Multidisciplinary Research Hub." (2015).
KUMAR, GAURAV. "Best Plan to Protect Against Phone Phishing Attack."American Journal of Computer Science and Information Technology (AJCSIT)3.5 (2015).