The Suitability of Different Binary Tree Obfuscations
暂无分享,去创建一个
[1] Stephen Drape,et al. Obfuscation of abstract data-types , 2004 .
[2] Maarten M. Fokkinga,et al. Functional Programming with Bananas, Lenses, Envelopes and Barbed Wire , 1991, FPCA.
[3] Peyton Jones,et al. Haskell 98 language and libraries : the revised report , 2003 .
[4] Jeremy Gibbons,et al. The under-appreciated unfold , 1998, ICFP '98.
[5] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[6] Kai Engelhardt,et al. Data Refinement: Model-Oriented Proof Methods and their Comparison , 1998 .
[7] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[8] S. Drape. An Obfuscation for Binary Trees , 2006, TENCON 2006 - 2006 IEEE Region 10 Conference.
[9] P. Biondi,et al. Silver Needle in the Skype , 2006 .
[10] Nuno Santos,et al. A Generic DRM Framework for J 2 ME Applications , 2003 .
[11] M. Gordon,et al. Introduction to HOL: a theorem proving environment for higher order logic , 1993 .
[12] Oege de Moor,et al. Generic Program Transformation , 1998, Advanced Functional Programming.
[13] Stephen Drape. Generalising the array split obfuscation , 2007, Inf. Sci..