Research on Code Obfuscation Based on Maze Protection Technology
暂无分享,去创建一个
Wei Min Wu | Jin Liang Li | Zhi Wei Huang | Wen Rui Ma | Zhi Yue Wang | Zhi Wang | Wenjuan Ma | Wei Min Wu | Jin Liang Li | Zhi Wei Huang
[1] Christian S. Collberg,et al. Toward Digital Asset Protection , 2011, IEEE Intelligent Systems.
[2] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[3] Ludovic Mé,et al. Code obfuscation techniques for metamorphic viruses , 2008, Journal in Computer Virology.
[4] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[5] Glenn Ellison,et al. Search, Obfuscation, and Price Elasticities on the Internet , 2004 .
[6] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.