Jump to content
Tuts 4 You

Java Reversing

6 files

  1. Java Reversing

    The following is a sample tutorial on Java reversing. The reader must know the architecture and Java JVM asm, however I will report some essentials during the article.

    63 downloads

    0 comments

    Submitted

  2. Javascript Obfuscation Reversing

    Imagine a JavaScript encoding method that produces files that contain no alphanumeric characters, only symbols such as ‘$’, ‘_’, and ‘+’. It would be difficult to imagine how it could possibly work, but unfortunately one such encoder exists. It is called ‘JJEncode’. A demonstration version is freely available from the author’s website, and has already been used in malware. This article provides a detailed description of how it works.

    22 downloads

    0 comments

    Submitted

  3. Notes on Reversing Java (1-3)

    Notes on Reversing Java - Part 1
    Notes on Reversing Java - Part 2
    Notes on Reversing Java - Part 3
     

    38 downloads

    0 comments

    Submitted

  4. Reversing Java Programs (1-2)

    This tutorial is supposed to be an easy tutorial since cracking JAVA is easy - of course with proper tools. Is not like when we unpack Themida .NET.

    In this tutorial I've posted links to homepage of some JAVA obfuscators and Java to exe convertors, you may use these programs to protect some jars and see what these protections do.

    44 downloads

    0 comments

    Submitted

  5. Static and Dynamic Reverse Engineering For Java Systems

    This dissertation shows that integration of dynamic and static information aids the performance of reverse engineering tasks. An experimental environment called Shimba has been built to support reverse engineering of Java software systems. The static information is extracted from Java byte code [118]. It can be viewed and analyzed with the Rigi reverse engineering tool [74]. The dynamic event trace information is generated automatically as a result of running the target system under a customized Java Development Kit (JDK) debugger. Information about the dynamic control flow of selected objects or methods can also be extracted. The event trace can then be viewed and analyzed with the SCED tool. To support model comprehension, the models built can be used to modify and improve each other by means of information exchange, model slicing, and building abstractions.

    36 downloads

    0 comments

    Submitted

  6. A Practical Method for Watermarking Java Programs

    Java programs distributed through Internet are now suffering from program theft. It is because Java programs can be easily decomposed into reusable class files even decompiled into source code by program users. In this paper we propose a practical method discourages program theft by embedding Java programs with a digital watermark. Embedding a program developers copyright notation as a watermark in Java class files will ensure the legal ownership of class files.

    Our embedding method is indiscernible by program users, yet enables us to identify an illegal program that contains stolen class files. The result of the experiment to evaluate our method showed most of the watermarks (20 out of 23) embedded in class files survived two kinds of attacks that attempt to erase watermarks: an obfuscactor attack, and a decompile-recompile attack.

    21 downloads

    0 comments

    Submitted


×
×
  • Create New...