Obfuscation techniques for enhancing software security

  • US 6,668,325 B1
  • Filed: 06/09/1998
  • Issued: 12/23/2003
  • Est. Priority Date: 06/09/1997
  • Status: Expired due to Term
First Claim
Patent Images

1. A computer implemented method for obfuscating code, comprising:

  • identifying one or more source code input files corresponding to source code for the code of an application to be processed;

    selecting a required level of obfuscation (the potency);

    selecting a maximum execution time or space penalty (the cost);

    reading and parsing the input files;

    providing information identifying data types, data structures, and control structures used by the application to be processed;

    selecting and applying obfuscating transformations to source code objects until the required potency has been achieved or the maximum cost has been exceeded; and

    outputting the transformed code of the application, wherein the transformed code provides weak equivalence to the untransformed code.

View all claims

    Thank you for your feedback