Intellectual Property Protection using Obfuscation
暂无分享,去创建一个
[1] Anas N. Al-Rabadi,et al. A comparison of modified reconstructability analysis and Ashenhurst‐Curtis decomposition of Boolean functions , 2004 .
[2] David W. Binkley,et al. Slice-based cohesion metrics and software intervention , 2004, 11th Working Conference on Reverse Engineering.
[3] Yuan Xiang Gu,et al. An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs , 2001, ISC.
[4] Taghi M. Khoshgoftaar,et al. Measurement of data structure complexity , 1993, J. Syst. Softw..
[5] Yuichiro Kanzaki,et al. Queue-based cost evaluation of mental simulation process in program comprehension , 2003, Proceedings. 5th International Workshop on Enterprise Networking and Computing in Healthcare Industry (IEEE Cat. No.03EX717).
[6] Stephen Drape,et al. A Survey of Control-Flow Obfuscations , 2006, ICISS.
[7] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[8] Jack W. Davidson,et al. Protection of software-based survivability mechanisms , 2001, 2001 International Conference on Dependable Systems and Networks.
[9] Clark D. Thomborson,et al. Manufacturing opaque predicates in distributed systems for code obfuscation , 2006, ACSC.
[10] Linda M. Ott,et al. Slice based metrics for estimating cohesion , 1993, [1993] Proceedings First International Software Metrics Symposium.
[11] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[12] Fred M. Gerguras. Intellectual property protection in the USA , 1987 .
[13] Mark Weiser,et al. Program Slicing , 1981, IEEE Transactions on Software Engineering.
[14] Stephen Drape,et al. Obfuscation of abstract data-types , 2004 .
[15] A. Majumdar,et al. Series Design and Evaluation of Slicing Obfuscations , 2007 .
[16] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[17] Warren A. Harrison,et al. A complexity measure based on nesting level , 1981, SIGP.
[18] Stephen Drape,et al. Specifying Imperative Data Obfuscations , 2007, ISC.
[19] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.
[20] Oege de Moor,et al. Transforming the .NET intermediate language using path logic programming , 2002, PPDP '02.
[21] Clark Thomborson,et al. Metrics-based Evaluation of Slicing Obfuscations , 2007 .
[22] Koen De Bosschere,et al. Understanding Obfuscated Code , 2006, 14th IEEE International Conference on Program Comprehension (ICPC'06).
[23] Jens Palsberg,et al. Experience with software watermarking , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[24] P. Biondi,et al. Silver Needle in the Skype , 2006 .
[25] Frank Tip,et al. A survey of program slicing techniques , 1994, J. Program. Lang..
[26] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[27] Kai Engelhardt,et al. Data Refinement: Model-Oriented Proof Methods and their Comparison , 1998 .
[28] Stephen Drape,et al. Metrics-based Evaluation of Slicing Obfuscations , 2007, Third International Symposium on Information Assurance and Security.
[29] Nuno Santos,et al. A Generic DRM Framework for J 2 ME Applications , 2003 .
[30] Stephen Drape,et al. Slicing obfuscations: design, correctness, and evaluation , 2007, DRM '07.
[31] Stephen Drape,et al. Slicing Aided Design of Obfuscating Transforms , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).
[32] Stephen Drape. Generalising the array split obfuscation , 2007, Inf. Sci..