<p id="nxp5x"><big id="nxp5x"><noframes id="nxp5x">

    <var id="nxp5x"><video id="nxp5x"></video></var>

          <em id="nxp5x"></em>

              首 頁 本刊概況 出 版 人 發行統計 在線訂閱 歡迎投稿 市場分析 1 組織交流 1 關于我們
             
            1
               通信短波
            1
               新品之窗
            1
               優秀論文
            1
               通信趨勢
            1
               特別企劃
            1
               運營商動態
            1
               技術前沿
            1
               市場聚焦
            1
               通信視點
            1
               信息化論壇
            1
            當前位置:首頁 > 優秀論文
            Android平臺軟件保護技術
            作者:張 鵬 牛少彰
            來源:本站原創
            更新時間:2014/3/10 14:36:00
            正文:

             

                                 (北京郵電大學計算機學院,北京 100876)
            摘 要  Android開源的特點使其得到了廣大廠商和開發者的支持,但應用市場繁榮的背后卻存在大量的軟件盜版行為。本文在對Android平臺結構進行分析的基礎上,分別對幾種現有的Android平臺軟件保護技術進行了總結,如代碼混淆技術、動態加載技術、軟件水印技術等。
            關鍵詞 Android;軟件保護;代碼混淆;動態加載;軟件水印

            Software Protection Technology for Android Platform
            Zhang  Peng,    Niu  Shaozhang
            (School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, 100876)
            Abstract  Android gets support from many vendors and developers since it has open source feature. Unfortunately, the booming application market has to face the increasing application pirate. The article tries to survey some technologies which are useful for preventing those threats, such as code obfuscation, dynamic loading, software watermarking.
            Keywords  Android; Software Protection; Code Obfuscation; Dynamic Loading; Software Watermarking

             

             

            參考文獻
            [1] Collberg C,Thomborson C,Low D.A Taxonomy of Obfuscating Transformations[R].Department of Computer Science,University of Auckland:Technical Report 10,1997
            [2] Chan J T,Yang W.Advanced obfuscation techniques for Java bytecode[J].Journal of Systems and Software,2004,71(1-2):1-10
            [3] De A R,Van L O.Stealthy obfuscation techniques:Misleading the pirates[J].Department of Computer Science University of Twente Enschedc,The Netherlands, 2003.
            [4] T.W. Hou, H.Y. Chen, M.H. Tsai. Three control flow obfuscation methods for JAVA software[J]. IEEE Proceedings-Software, Vol. 153, No. 2, April 2006.
            [5] Sosonkin M,Naumovich G,Memon N.Obfuscation of design intent in object-oriented applications[J]. Proceedings of the Digital Rights Management Workshop.Washington,DC,USA,2003:142-153
            [6] Patrick Schulz. Code Protection in Android. Insititute of Computer Science, Rheinische Friedrich-Wilhelms-Universität Bonn, Germany. June 7, 2012
            [7] 張立和, 楊義先, 鈕心忻, 牛少彰. 軟件水印綜述[J]. 軟件學報, 2003,14(2): 268~277.
            [8] Wu Zhou, Yajin Zhou, Xuxian Jiang, and Peng Ning. DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces[C]. In Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY ’12, February 2012.
            [9] Jonathan Crussell, Clint Gibler, and Hao Chen. Attack of the Clones: Detecting Cloned Applications on Android Markets[C]. In 17th European Symposium on Research in Computer Security, ESORICS 2012, September 2012.
            [10] Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang, and Shihong Zou. Fast, Scalable Detection of Piggybacked Mobile Applications[C]. In Proceedings of the 3nd ACM Conference on Data and Application Security and Privacy, CODASPY ’13,

             
             
               
            《通信市場》 中國·北京·復興路49號通信市場(100036) 點擊查看具體位置
            電話:86-10-6820 7724, 6820 7726
            京ICP備05037146號-8
            建議使用 Microsoft IE4.0 以上版本 800*600瀏覽 如果您有什么建議和意見請與管理員聯系
            欧美成人观看免费全部欧美老妇0,嫩草成人影视,国产成人亚洲日本,国产成人亚洲欧美在线观看