|
MAIN PAGE
> Back to contents
Cybernetics and programming
Reference:
Korobeinikov A.G., Kutuzov I.M. —
Obfuscation of concealment calls using InvokeDynamic instructions
// Cybernetics and programming.
– 2016. – № 5.
– P. 33 - 37.
DOI: 10.7256/2306-4196.2016.5.18686 URL: https://en.nbpublish.com/library_read_article.php?id=18686
Obfuscation of concealment calls using InvokeDynamic instructions
Korobeinikov Anatolii Grigor'evich
Doctor of Technical Science
professor, Pushkov institute of terrestrial magnetism, ionosphere and radio wave propagation of the Russian Academy of Sciences St.-Petersburg Filial
199034, Russia, g. Saint Petersburg, ul. Mendeleevskaya, 1
|
Korobeynikov_A_G@mail.ru
|
|
 |
Другие публикации этого автора |
|
Kutuzov Il'ya Mikhailovich
graduate student, Department of Design and Security of Computer Systems, St. Petersburg National Research University of Information Technologies, Mechanics and Optics
197101, Russia, St. Petersburg, Kronverkskiy prospect, d. 49
|
formalizator@gmail.com
|
|
 |
Другие публикации этого автора |
|
DOI: 10.7256/2306-4196.2016.5.18686
Review date:
07-04-2016
Publish date:
19-10-2016
Abstract: The object of the study is technology of hiding method calls. Hidden calls are need to hide: entity dependencies; data processing logic; algorithms. The methods used to complete the task are limited by language technologies and its performance. Method can be called directly and indirectly: via the bootstrap method; from native code (JNI); using Reflection; using JRE 1.7, InvokeDynamic. The examples with source code are given. The authors conclude that the most promising methods among considered is invokedynamic technology. The study present analysis of such methods as the bootstrap method, calling method from through native code, obfuscation calls via Reflection and InvokeDynamic. The article discusses various ways to conceal the method invocation. The characteristic features of obfuscation for most popular ones are reviewed. The most promising among the discussed methods is invokedynamic technology. It allows completely removing method signature from the source code, leaving only the service information for the bootstrap method. With proper implementation of the bootstrap method it is possible to create bytecode, which will be impossible to decompile into valid Java code, Groovy's or Scala.
Keywords:
InvokeDynamic, Reflection mechanism, native code, bootstrap, obfuscate, Data protection, Java, source code, method call, listing
This article written in Russian. You can find full text of article in Russian
here
.
References
1.
|
Korobeinikov A.G., Kutuzov I.M., Kolesnikov P.Yu. Primenenie metodov obfuskatsii // Informatsionnye tekhnologii v professional'noi deyatel'nosti i nauchnoi rabote: sbornik materialov Vserossiiskoi nauchno-prakticheskoi konferentsii s mezhdunarodnym uchastiem: v 2 ch. Ioshkar-Ola: Mariiskii gosudarstvennyi tekhnicheskii universitet, 2012. T. 1. S. 24-28. - ISBN 978-5-8158-1002-0.
|
2.
|
Korobeinikov A.G., Kutuzov I.M., Kolesnikov P.Yu., Makarov S.P., Akhapkina I.B. Analiz primeneniya metodov obfuskatsii // V knige “Trudy kongressa po intellektual'nym sistemam i informatsionnym tekhnologiyam AIS-IT’12. Nauchnoe izdanie v 4-kh tomakh. M.: Fizmatlit, 2012. T. 2. S. 203-208.
|
3.
|
Korobeinikov A.G., Kutuzov I.M. Issledovanie algoritma obfuskatsii // Informatsionnye tekhnologii v professional'noi deyatel'nosti i nauchnoi rabote: sbornik materialov Vserossiiskoi nauchno-prakticheskoi konferentsii s mezhdunarodnym uchastiem: v 2 ch. Ioshkar-Ola: Povolzhskii gosudarstvennyi tekhnologicheskii universitet, 2013. Ch. 1. 227 s. – ISBN 978-5-8158-1002-0.
|
4.
|
Korobeinikov A.G., Kutuzov I.M. Algoritm obfuskatsii // NB: Kibernetika i programmirovanie. 2013. № 3. S. 1-8. DOI: 0.7256/2306-4196.2013.3.9356. URL: http://e-notabene.ru/kp/article_9356.html
|
5.
|
Korobeinikov A.G., Akhapkina I.B, Bezruk N.V., Demina E.A., Yamshchikova N.V., Kutuzov I.M. Modifikatsiya i analiz algoritma obfuskatsii // V knige “Trudy kongressa po intellektual'nym sistemam i informatsionnym tekhnologiyam AIS-IT’13. Nauchnoe izdanie v 4-kh tomakh. M.: Fizmatlit, 2013. T. 2. S. 163-166. – ISBN 978-5-9221-1479-0.
|
6.
|
Korobeinikov A.G., Kutuzov I.M., Kolesnikov P.Yu. Analiz metodov obfuskatsii // Kibernetika i programmirovanie. 2012. № 1. C. 31 - 37. URL: http://www.e-notabene.ru/kp/article_13858.html
|
7.
|
Ortin F., Conde P., Fernandez-Lanvin D. , Izquierdo R.: The Runtime Performance of invokedynamic: An evaluation with a java library, IEEE Software, 2014, Vol. 31, Art. 6493308. P. 82-90.
|
8.
|
Ortin F., Redondo J.M., Baltasar García Perez-Schofield, J.: Efficient virtual machine support of runtime structural reflection. Science of Computer Programming, 2009, 74 (10), p. 836-860.
|
Link to this article
You can simply select and copy link from below text field.
|
|