Java Bytecode Obfuscator Using Exception Handling Mechanism
碩士 === 國立清華大學 === 資訊工程學系 === 88 === Recently, mobile computing and enterprise computing are more and more popular over computer networks. In mobile computing, it has become common to distribute mobile programs to the clients at the time when they needed. Because the client platforms are of many type...
Main Authors: | Pao-Chin Tsai, 蔡寶進 |
---|---|
Other Authors: | Jia-Shung Wang |
Format: | Others |
Language: | en_US |
Published: |
2000
|
Online Access: | http://ndltd.ncl.edu.tw/handle/62949161489806889919 |
Similar Items
-
Java bytecode obfuscation
by: Batchelder, Michael Robert
Published: (2007) -
Control Flow Obfuscation and Protection of Java Bytecode Programs
by: Hsiang-Yang Chen, et al.
Published: (2009) -
Obfuscate Java bytecode: an evaluation ofobfuscating transformations using JBCO
by: HILLERT, EMILIA
Published: (2014) -
Obfuscation Using Exception Handling
by: Huang, Chih-Chao, et al.
Published: (2010) -
Exception Implementation based on Translating Java Bytecode to X86 Assembly
by: Zong Qiang Chen, et al.
Published: (2004)