Computer Science ›› 2017, Vol. 44 ›› Issue (12): 114-114.doi: 10.11896/j.issn.1002-137X.2017.12.022
Previous Articles Next Articles
SU Qing and SUN Jin-tian
[1] PREDA M D,GIACOBAZZI R.Control Code Obfuscation byAbstract Interpretation[C]∥IEEE International Conference on Software Engineering and Formal Methods.IEEE Xplore,2005:301-310. [2] ZHAO Y J,TANG Z Y,WANG I.Evaluation of code obfuscating Transformation[J].Journal of Software,2012,23(3):700-711. [3] COLLBERG C,THOMBORSON C D.Low manufacturing cheap,resilient,and stealthy opaque constructs[C]∥Proceeding of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.California:ACM,1998:184-196. [4] ARBOIT G.A method for watermarking java programs viaopaque predicates[C]∥The Fifth International Conference on Electronic Commerce Research (ICECR-5).2002:102-110. [5] MYLES G,COLLBERG C.Software watermarking via opaquepredicates:implementation,analysis,and attacks[J].Electron Commerce Research,2006,4(6):155-171. [6] YUAN Z,WEN Q,MAO M.Constructing Opaque Predicatesfor Java Programs[C]∥2006 International Conference on Computational Intelligence and Security.2006:895-898. [7] SU Q,WU W M,LI Z L,et al.Research and Application of ChaosOpaque Predicate in Code Obfuscation[J].Computer Science,2013,40(6):155-160. [8] XIE X,LIU F,LU B,et al.Mixed Obfuscation of Overlapping Instruction and Self-Modify Code Based on Hyper-Chaotic Opaque Predicates[C]∥Tenth International Conference on Computational Intelligence and Security.IEEE Computer Society,2014:524-528. [9] WANG C X.A security architecture for survivability mecha-nisms[D].Charlottesville:University of Virginia,2001. [10] COLLBERG C,NAGRA J.Surreptitious Software Obfuscation,Watermarking,and Tamperproofing for Software Protection[M].Beijing:Post & Telecom Press,2012:204-205. [11] MOSER A,KRUEGEL C,KIRDA E.Limits of Static Analysis for Malware Detection[C]∥Computer Security Applications Con-ference,2007.IEEE,2007:421-430. [12] WU W M,LIN S M,LIN Z Y.chaotic-based opaque predicate control flow flatten algorithm[J].Computer Science,2015,42(5):178-182. [13] GONZALOALVAREZ,SHUJUNLI.Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems[J].International Journal of Bifurcation & Chaos,2006,16(8):2129-2151. [14] YUAN G N,QIN H L,LAI D S.Construct of Tent Map Stream Cipher on Square[J].Computer Engineering and Applications,2002,8(13):124-126. [15] SCHUMACKER R,TOMEK S.Understanding Statistics Using R[M].Springer Publishing Company,Incorporated,2013. [16] COLLBERG C.A Tool for the Study of Software Protection Algorithms[EB/OL].http://sandmark.cs.arizona.edu. |
No related articles found! |
|