Applying tools for bytecode obfuscation in the process of the memory optimization

Krzysztof Dobosz, Tomasz Wesołowski


The article presents essential methods of obfuscation the bytecode prepared for the KVM virtual machine. The special attention is paid to the lexicographical method. Next a few free tools for obfuscation were tested. Authors noticed that the most of them caused reducing the size of obfuscated applications.


code obfuscation; memory optimization; midlet

Full Text:

PDF (Polski)


The Java ME Platform. Witryna: (czerwiec 2008).

The K virtual machine. Witryna: (czerwiec 2008).

Connected Limited Device Configuration. Witryna: (czerwiec 2008).

Mobile Information Device Profile. Witryna: (czerwiec 2008).

Hardwick J.: Java optimization. Witryna: (maj 2008).

Shirazi J.: Java Performance Tuning. Witryna: (maj 2008).

Wojtyczka M.: Tworzenie i optymalizacja gier na urządzenia mobilne w technologii J2ME. Praca dyplomowa magisterska, Politechnika Śląska, Gliwice 2006.

D. Low: Java Control Flow Obfuscation. MSc thesis, University of Auckland, 1998. Witryna: (czerwiec2008).

C. Collberg, C. Thomborson, D. Low: Obfuscation techniques for enhancing software security. U.S. Patent 6668325. Witryna: (lipiec 2008).

H. Lai: A comparative survey of Java obfuscators available on the Internet. 415.780 Project Report, Computer Science Department, University of Auckland, 2001.

M. Karnick, J. MacBride, S. McGinnis, Y. Tang, and R. Ramachandran: A Comparative Study of Java Obfuscators. IASTED International Conference on Software Engineering and Applications, Phoenix, Arizona 2005, November 14-16, s. 82^-86.

Dobosz K. (red.): Laboratorium programowania w języku Java. Wydawnictwo Politechniki Śląskiej, Gliwice 2004.

Sun Wireless Toolkit for CLDC. Witryna, (czerwiec 2008).