The effectiveness of source code obfuscation: An experimental assessment
暂无分享,去创建一个
Marco Torchiano | Paolo Falcarin | Mariano Ceccato | Paolo Tonella | Filippo Ricca | Massimiliano Di Penta | Jasvir Nagra | J. Nagra | M. Ceccato | P. Tonella | M. D. Penta | Marco Torchiano | P. Falcarin | Filippo Ricca
[1] Masahiro Mambo,et al. An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software , 2000, ISW.
[2] Peter M. Chisnall,et al. Questionnaire Design, Interviewing and Attitude Measurement , 1993 .
[3] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[4] Koen De Bosschere,et al. Program obfuscation: a quantitative approach , 2007, QoP '07.
[5] Claes Wohlin,et al. Experimentation in software engineering: an introduction , 2000 .
[6] Andrew Blyth,et al. An empirical examination of the reverse engineering process for binary files , 2006, Comput. Secur..
[7] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[8] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[9] David J. Sheskin,et al. Handbook of Parametric and Nonparametric Statistical Procedures , 1997 .
[10] Marco Torchiano,et al. Towards experimental evaluation of code obfuscation techniques , 2008, QoP '08.
[11] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[12] P. Lachenbruch. Statistical Power Analysis for the Behavioral Sciences (2nd ed.) , 1989 .
[13] Saumya K. Debray,et al. Deobfuscation: reverse engineering obfuscated code , 2005, 12th Working Conference on Reverse Engineering (WCRE'05).