Skip to main content
2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, TELSIKS 2013Volume 2, 2013, Article number 6704410, Pages 409-4122013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, TELSIKS 2013; Nis; Serbia; 16 October 2013 through 19 October 2013; Category numberCFP13488-ART; Code 102451

Improving protection of PHP source code using cryptology models(Conference Paper)

  Save all to author list
  • aUniverzitet Singidunum, Danijelova 32, 11000 Belgrade, Serbia
  • bFakultet Za Računarstvo i Informatiku, Univerzitet Sinergija, Raje Baničića bb, 76300 Bijeljina, Srpska, Bosnia and Herzegovina

Abstract

Nowadays there is growing issue in protecting PHP scripts from unwanted using, copying and modifications. Existing solutions on source code level are mostly working as obfuscators, are free, and are not providing any serious protection. Solutions that encode opcode are more secure but are commercial and require closed-source proprietary PHP interpreter's extension. Additionally, encoded opcode is not compatible with future versions of interpreters which imply rebuying encoders from authors. Finally, if extension source-code is compromised, all script encoded by that solution are compromised too. In this paper we present a novel model for free and open-source PHP script protection solution. Protection level provided by proposed solution is equal to protection level of commercial solutions. Model is based on conclusions from using standard cryptology models for analyzing strengths and weaknesses of existing solutions when scripts protection is seen as secure communication channel in cryptology. © 2013 IEEE.

Author keywords

encryptioninterpreted languagesPHPprotectionsource code

Indexed keywords

Engineering uncontrolled termsCryptologyInterpreted languagesOpen-sourcePHPprotectionProtection levelSecure communication channelsSource codes
Engineering controlled terms:CablesCryptography
Engineering main heading:Computer programming languages
  • ISBN: 978-147990902-5
  • Source Type: Conference Proceeding
  • Original language: English
  • DOI: 10.1109/TELSKS.2013.6704410
  • Document Type: Conference Paper

  Univerzitet Singidunum, Danijelova 32, Serbia
© Copyright 2014 Elsevier B.V., All rights reserved.

Cited by 5 documents

Ouyang, X. , Xu, B. , Jiang, J.
Analysis on the application of deep neural network model in the improvement of traditional PHP source code auditing tools
(2024) Proceedings of SPIE - The International Society for Optical Engineering
Khairunisa, I. , Kabetta, H.
PHP Source Code Protection Using Layout Obfuscation and AES-256 Encryption Algorithm
(2021) Proceedings - IWBIS 2021: 6th International Workshop on Big Data and Information Security
Ismanto, R.N. , Salman, M.
Improving security level through obfuscation technique for source code protection using AES algorithm
(2017) ACM International Conference Proceeding Series
View details of all 5 citations
{"topic":{"name":"Obfuscation; Application Program; Reverse Engineering","id":12901,"uri":"Topic/12901","prominencePercentile":63.383904,"prominencePercentileString":"63.384","overallScholarlyOutput":0},"dig":"c43b0ae6d1fcb89117e9d683a92c3ba78e7d2e81b0db41dc8c04fb8a239fc86d"}

SciVal Topic Prominence

Topic:
Prominence percentile: