Abstract
Web applications have become popular attacking targets for years. To protect web applications from intruders, many obfuscation techniques have been proposed. Most of those obfuscation software applications have been developed to obfuscate the client-side source code. However, one of the most vulnerable parts of web applications is the server side, especially when Java language is used, because that is where the core part of web applications including sensitive data as well as business logic is stored and processed. To safeguard the source code on server-side, the Mutational Obfuscation System (MOS) has been proposed. This system protects web application source code by obfuscating the java class files, packaging and encrypting those class files before it is sent and deployed to the web server. Moreover, to assure that the web application works well after being obfuscated by the MOS system, the availability checking tool has been exploited. Our experiment result shows that the security of the server-side source code has been intensified and the performance of the web application is maintained after the source code is obfuscated.
Original language | English |
---|---|
Pages (from-to) | 3827-3837 |
Number of pages | 11 |
Journal | Journal of Electrical Engineering and Technology |
Volume | 18 |
Issue number | 5 |
DOIs | |
Publication status | Published - 2023 Sept |
Bibliographical note
Publisher Copyright:© 2023, The Author(s) under exclusive licence to The Korean Institute of Electrical Engineers.
Keywords
- Java obfuscation
- Mutation
- Mutational obfuscation
- Obfuscation
- Web obfuscation
ASJC Scopus subject areas
- Electrical and Electronic Engineering