Research Article
An Analysis of Security System for Intrusion in Smartphone Environment
Input , ; Program to be interpreted, and its data | ≔ 2; znitialize program counter and obfuscated store: | ≔ ; | While do | ; | case instruction of Dispatch on syntax | skip : ; Obfuscate values when stored: | x ≔ e : ; | … | Output ; | Obfuscation/de-obfuscation | = case e of | constant : | variable : De-obfuscate variable values | e1 + e2 : | e1 − e2 : | … |
|