A strategy for effectively applying a control flow obfuscation to programs
暂无分享,去创建一个
[1] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[2] David A. Wagner,et al. A Graph Approach to Quantitative Analysis of Control-Flow Obfuscating Transformations , 2009, IEEE Transactions on Information Forensics and Security.
[3] Atsuko Miyaji,et al. Java Obfuscation Approaches to Construct Tamper-Resistant Object-Oriented Programs , 2005 .
[4] John Stephen Davis,et al. A Study of the Applicability of Complexity Measures , 1988, IEEE Trans. Software Eng..
[5] Eldad Eilam,et al. Reversing: Secrets of Reverse Engineering , 2005 .
[6] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[7] Ting-Wei Hou,et al. Three control flow obfuscation methods for Java software , 2006, IEE Proc. Softw..
[8] Atsuko Miyaji,et al. Software Obfuscation on a Theoretical Basis and Its Implementation , 2003, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.
[9] Douglas Low,et al. Java Control Flow Obfuscation , 1998 .
[10] Kouichi Sakurai,et al. Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow , 2005, EUC Workshops.
[11] Kim Mi-Jin,et al. A Study of Estimation for Web Application Complexity , 2004 .
[12] Woosung Jung,et al. A Structural Complexity Metric for Web Application based on Similarity , 2010 .