no code implementations • 22 May 2012 • Praveen Sivadasan, P. Sojan Lal
The intermediate SQLJ application byte codes are open to decompilation, allowing a malicious reader to forcefully decompile it for understanding confidential business logic or data from the codes.
Cryptography and Security Databases Distributed, Parallel, and Cluster Computing
no code implementations • 20 Sep 2008 • Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan
Obfuscated source code produce obfuscated byte codes and hence two level obfuscation (source code and byte code level) of the program makes it more resilient to reverse engineering attacks.
Cryptography and Security
no code implementations • 27 Jul 2008 • Praveen Sivadasan, P. Sojan Lal
A tool named JDATATRANS is developed for generating classes and to the best of our knowledge this is the first tool available for array restructuring, on java source codes.
Cryptography and Security