Comparing the effectiveness of commercial obfuscators against MATE attacks
暂无分享,去创建一个
[1] Roger S. Pressman,et al. Software Engineering: A Practitioner's Approach , 1982 .
[2] Steven Furnell,et al. Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions , 2015, J. Netw. Comput. Appl..
[3] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[4] Mamta Garg,et al. Reverse Engineering - Roadmap to Effective software Design , 2009 .
[5] A. Berztiss,et al. Requirements Engineering , 2002, J. Object Technol..
[6] Ulf Nilsson,et al. A Comparative Study of Industrial Static Analysis Tools , 2008, SSV.
[7] Linda M. Head,et al. A COMPARATIVE STUDY OF JAVA OBFUSCATORS , 2005 .
[8] Todd R. Andel,et al. Probing the Limits of Virtualized Software Protection , 2014, PPREW@ACSAC.
[9] Marco Torchiano,et al. A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques , 2013, Empirical Software Engineering.
[10] Paolo Falcarin,et al. Guest Editors' Introduction: Software Protection , 2011, IEEE Software.
[11] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[12] Bruce McMillin,et al. Software engineering: What is it? , 2018, 2018 IEEE Aerospace Conference.
[13] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[14] Michael Chau,et al. The classification of hackers by knowledge exchange behaviors , 2015, Inf. Syst. Frontiers.
[15] Christian S. Collberg,et al. Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection , 2009, Addison-Wesley Software Security Series.