Research Article

An Analysis of Security System for Intrusion in Smartphone Environment

Algorithm 1

Input   , ;                         Program to be interpreted, and its data
2;                          znitialize program counter and obfuscated store:
;
While     do
;
case  instruction  of                      Dispatch on syntax
skip   :   ;                  Obfuscate values when stored:
x    e     : ;
Output   ;
                 Obfuscation/de-obfuscation
= case e of
constant :
variable  :                    De-obfuscate variable values
e1 + e2    :
e1 − e2    :