• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Dynamic Diversifying Methods for the Java Platform

Research Project

Project/Area Number 25730087
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeMulti-year Fund
Research Field Information security
Research InstitutionKyoto Sangyo University

Principal Investigator

TAMADA Haruaki  京都産業大学, コンピュータ理工学部, 准教授 (30457139)

Project Period (FY) 2013-04-01 – 2016-03-31
Project Status Completed (Fiscal Year 2015)
Budget Amount *help
¥4,290,000 (Direct Cost: ¥3,300,000、Indirect Cost: ¥990,000)
Fiscal Year 2015: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2014: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2013: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Keywords動的難読化 / Java / invokedynamic命令 / バースマーク / 動的多様化 / 難読化 / 不自然さ評価 / 動的解析 / ステルシネス / invokedynamic / メソッド引数入れ替え / 堅牢性 / 畳み込み
Outline of Final Research Achievements

In this research, we realized dynamic diversifying methods in the Java platform by the novel mechanism instrumentation introduced in Java 5.
Our research consists of three categories; (A) hiding the program at the runtime, (B) reducing the overhead from the protection methods, and (C) evaluating the tolerance against dynamic analysis.
The outcomes of our research are: (A) the self-modification technique by methods folding, (B) lightweight and dynamic obfuscation method with invokedynamic instruction, and (C) the evaluation method for robustness of the protection methods by (C-1) Kolmogorov complexity, (C-2) stealthiness by perplexity, (C-3) identifying applied obfuscation methods towards de-obfuscation, and (C-4) birthmarking methods for more large scale software search.

Report

(4 results)
  • 2015 Annual Research Report   Final Research Report ( PDF )
  • 2014 Research-status Report
  • 2013 Research-status Report
  • Research Products

    (16 results)

All 2016 2015 2014 2013

All Journal Article (2 results) (of which Peer Reviewed: 2 results) Presentation (14 results)

  • [Journal Article] To Prevent Reverse-Enginnering Tools by Shuffling the Stack Status with Hook Mechanism2015

    • Author(s)
      Kazumasa Fukuda and Haruaki Tamada
    • Journal Title

      International Journal of Software Innovation

      Volume: 3 Issue: 3 Pages: 14-25

    • DOI

      10.4018/ijsi.2015070102

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Evaluation of Software Obfuscation Based on the Randomness of Instructions2013

    • Author(s)
      二村 阿美,門田 暁人,玉田 春昭,神崎 雄一郎,中村 匡秀,松本 健一
    • Journal Title

      Computer Software

      Volume: 30 Issue: 3 Pages: 3_18-3_24

    • DOI

      10.11309/jssst.30.3_18

    • NAID

      10031178227

    • ISSN
      0289-6540
    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Presentation] 逆難読化に向けた適用された難読化手法の特定2016

    • Author(s)
      匂坂 勇仁, 玉田 春昭
    • Organizer
      情報処理学会第78回全国大会
    • Place of Presentation
      慶應義塾大学 矢上キャンパス(神奈川県・横浜市)
    • Year and Date
      2016-03-10
    • Related Report
      2015 Annual Research Report
  • [Presentation] コードクローンと使用ライブラリに着目したオープンソースソフトウェアの進化の定量化2015

    • Author(s)
      若林 洸太,門田 暁人,伊原 彰紀,玉田 春昭
    • Organizer
      研究報告ソフトウェア工学(SE), Vol.2015-SE-190, No.2
    • Place of Presentation
      JR博多シティ会議室 10F 大会議室C+D(福岡県・福岡市)
    • Year and Date
      2015-12-15
    • Related Report
      2015 Annual Research Report
  • [Presentation] 適用保護手法特定の試み -不自然さ評価方法を用いて-2015

    • Author(s)
      匂坂 勇仁,玉田 春昭
    • Organizer
      信学技報, Vol. 115, No. 153, SS2015-21
    • Place of Presentation
      札幌市教育文化会館(北海道・札幌市)
    • Year and Date
      2015-07-22
    • Related Report
      2015 Annual Research Report
  • [Presentation] メソッド呼び出しのフックを用いた動的コールフローグラフ偽装の試み2015

    • Author(s)
      稲垣 賢一,福田 收真,玉田 春昭
    • Organizer
      2015年暗号と情報セキュリティシンポジウム (SCIS2015)
    • Place of Presentation
      リーガロイヤルホテル小倉(小倉,北九州)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] 大量のプログラムを対象としたファジーハッシュを用いたバースマーク手法2015

    • Author(s)
      山本 照明,玉田 春昭,門田 暁人
    • Organizer
      2015年暗号と情報セキュリティシンポジウム (SCIS2015)
    • Place of Presentation
      リーガロイヤルホテル小倉(小倉,北九州)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] メタプログラミング技法を用いた偽装難読化手法2015

    • Author(s)
      福田 收真,稲垣 賢一,玉田 春昭
    • Organizer
      2015年暗号と情報セキュリティシンポジウム (SCIS2015)
    • Place of Presentation
      リーガロイヤルホテル小倉(小倉,北九州)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] フックを用いた変数アクセス偽装難読化に向けて2014

    • Author(s)
      福田 收真,玉田 春昭
    • Organizer
      ソフトウェア工学の基礎XXI,日本ソフトウェア科学会 FOSE2014
    • Place of Presentation
      霧島国際ホテル (鹿児島)
    • Year and Date
      2014-12-11 – 2014-12-13
    • Related Report
      2014 Research-status Report
  • [Presentation] An Obfuscation Method to Build a Fake Call Flow Graph by Hooking Method Calls2014

    • Author(s)
      Kazumasa Fukuda, Haruaki Tamada
    • Organizer
      14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2014)
    • Place of Presentation
      Harrah’s Casino Hotel (Las Vegas, U.S.A)
    • Year and Date
      2014-06-30 – 2014-07-02
    • Related Report
      2014 Research-status Report
  • [Presentation] An Obfuscation Method to Build a Fake Call Flow Graph by Hooking Method Calls2014

    • Author(s)
      Kazumasa Fukuda, Haruaki Tamada
    • Organizer
      14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2013)
    • Place of Presentation
      Harrah’s Casino Hotel, Las Vegas, U.S.A.
    • Related Report
      2013 Research-status Report
  • [Presentation] Javaバイトコード命令のオペコード、オペランドを用いた難読化手法のステルシネス評価2014

    • Author(s)
      大滝 隆貴,大堂 哲也,玉田 春昭,神崎 雄一郎,門田 暁人
    • Organizer
      2014年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      (2D2-2), 城山観光ホテル, 鹿児島, 日本
    • Related Report
      2013 Research-status Report
  • [Presentation] メソッド呼び出し関係隠蔽のための引数順序の入れ替えによる難読化2014

    • Author(s)
      福田 收真,玉田 春昭
    • Organizer
      2014年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      (2D2-3), 城山観光ホテル, 鹿児島, 日本
    • Related Report
      2013 Research-status Report
  • [Presentation] Java 7におけるAPI名隠ぺいのためのinvokedynamic命令を用いた難読化の試み2013

    • Author(s)
      福田 收真,玉田 春昭
    • Organizer
      コンピュータセキュリティシンポジウム 2013
    • Place of Presentation
      (3D4-2), かがわ国際会議場, 高松, 香川
    • Related Report
      2013 Research-status Report
  • [Presentation] A Dynamic Birthmark from Analyzing Operand Stack Runtime Behavior to Detect Copied Software2013

    • Author(s)
      Kazumasa Fukuda, Haruaki Tamada
    • Organizer
      13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2013)
    • Place of Presentation
      Sheraton Waikiki, Honolulu, Hawaii, U.S.A.
    • Related Report
      2013 Research-status Report
  • [Presentation] An Instruction Folding Method to Prevent Reverse Engineering in Java Platform2013

    • Author(s)
      Tetsuya Ohdo, Haruaki Tamada, Yuichiro Kanzaki, Akito Monden
    • Organizer
      13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2013)
    • Place of Presentation
      Sheraton Waikiki, Honolulu, Hawaii, U.S.A.
    • Related Report
      2013 Research-status Report

URL: 

Published: 2014-07-25   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi