Taking a lesson from stealthy rootkits
暂无分享,去创建一个
Eric Cole | Sandra Ring | E. Cole | S. Ring
[1] Gary McGraw,et al. Exploiting Software: How to Break Code , 2004 .
[2] Robert E. Tarjan,et al. Dynamic Self-Checking Techniques for Improved Tamper Resistance , 2001, Digital Rights Management Workshop.
[3] Mikhail J. Atallah,et al. Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.
[4] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..