Computer Science ›› 2015, Vol. 42 ›› Issue (5): 178-182.doi: 10.11896/j.issn.1002-137X.2015.05.036
Previous Articles Next Articles
WU Wei-min, LIN Shui-ming and LIN Zhi-yi
[1] Collberg C,Thomborson J,Low D.A Taxonomy of Obfuscating Transformations[R].Department of Computer Science,The University of Auckland,1997 [2] Wang Chen-xi.A security architecture for survivability mechanisms[D].Charlottesville:University of Virginia,2001 [3] Borello J M,Mé L.Code Obfuscation Techniques for Metamorphic Viruses[J].Journal of Computer Virology,2008,4(3):211-220 [4] Weaver N,Paxson V,Staniford S,et al.A Taxonomy of Computer Worms[C]∥Proceedings of the 2003 ACM workshop on Rapid malcode,Washington DC,USA,2003.ACM Press,2003:11-18 [5] Collberg C,Nagra J.Surreptitious Software Obfuscation,Watermarking,and Tamperproofing for Software Protection[M].Beijing:POST&TELECOM PRESS,2012:188-191 [6] 袁征,冯雁,温巧燕,等.构造一种新的混淆Java程序的不透明谓词[J].北京邮电大学学报,2007,0(6):103-106 [7] Arboit G.A method for watermarking java programs via opaque predicates[C]∥The Fifth International Conference on Electronic Commerce Research (ICECR-5).2002:102-110 [8] 苏庆,吴伟民,等.混沌不透明谓词在代码混淆中的研究与应用[J].计算机科学,2013,0(6):155-160 [9] Matthews R.On the derivation of a “chaotic” encryption algorithm[J].Cryptologia,1989,13(1):29-42 [10] Dawei Z,Guanrong C,Wenbo L.A chaos-based robust wavelet-domain watermarking algorithm[J].Chaos,Solitons & Fractals,2004,22(1):47-54 [11] 张健,于晓洋,任洪娥,等.一种改进的Arnold Cat变换图像置乱算法[J].计算机工程与应用,2009,5(35):14-17 [12] Chow S,Gu Y,Johnson H,et al.An Approach to the Obfuscation of Control-flow of Sequential Computer Programs [C]∥Proceedings of the 4th International Conference on Information Security, Malaga, Spain, 2001.Springer-Verlag,2001,2200:144-155 [13] László T,Kiss A.Obfuscating C++ Programs via ControlFlow Flattening[C]∥Proc.of the 10th Symposium on Programming Languages and Software Tools.2007 [14] Horwitz S,Reps T,Binkley D.Interprocedural slicing using dependence graphs[J].ACM Transactions on Programming Languages and Systems (TOPLAS),1990,12(1):26-60 [15] Udupa,Sharath K,Saumya K.Debray,and Matias Madou[C]∥Deobfuscation:Reverse engineering obfuscated code.Reverse Engineering,12th Working Conference on.IEEE,2005 [16] Blanck J.cyclomatic complexity analyzer(CCM) .http://www.blunck.info/ccm.html.2012 [17] 赵玉洁,汤战勇,王妮,等.代码混淆算法有效性评估[J].软件学报,2012,23(3):700-711 |
No related articles found! |
|