Polymorphic Algorithm of JavaScript Code Protection
暂无分享,去创建一个
[1] J.A. Adam. Data security-threats and countermeasures , 1992, IEEE Spectrum.
[2] Vladimir Cretu,et al. Threats and Countermeasures in GSM Networks , 2006, J. Networks.
[3] Ting-Wei Hou,et al. Three control flow obfuscation methods for Java software , 2006, IEE Proc. Softw..
[4] Laurie J. Hendren,et al. Metrics for Measuring the Effectiveness of Decompilers and Obfuscators , 2007, 15th IEEE International Conference on Program Comprehension (ICPC '07).
[5] Laurie J. Hendren,et al. Programmer-friendly Decompiled Java , 2006, 14th IEEE International Conference on Program Comprehension (ICPC'06).