Code Obfuscation Literature Survey
暂无分享,去创建一个
[1] Peter Szor,et al. HUNTING FOR METAMORPHIC , 2001 .
[2] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[3] Koen De Bosschere,et al. Software Protection Through Dynamic Code Mutation , 2005, WISA.
[4] Christian S. Collberg,et al. Breaking abstractions and unstructuring data structures , 1998, Proceedings of the 1998 International Conference on Computer Languages (Cat. No.98CB36225).
[5] C. Collberg,et al. A Multi-Faceted Defence Mechanism Against Code Injection Attacks , 2022 .
[6] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[7] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[8] Arun Lakhotia,et al. Abstract Stack Graph to Detect Obfuscated Calls in Binaries , 2004 .
[9] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[10] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[11] Jack W. Davidson,et al. Software Tamper Resistance: Obstructing Static Analysis of Programs , 2000 .
[12] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.