Computer Science ›› 2018, Vol. 45 ›› Issue (2): 215-221.doi: 10.11896/j.issn.1002-137X.2018.02.037
Previous Articles Next Articles
ZHANG Yu-jia, PANG Jian-min, ZHANG Zheng and WU Jiang-xing
[1] SCHRITTWIESER S,KATZENBEISSER S,KINDER J,et al.Protecting Software through Obfuscation:Can It Keep Pace with Progress in Code Analysis?[J].ACM Computing Surveys (CSUR),2016,49(1):1-31. [2] BORELLO J M,M L.Code obfuscation techniques for metamorphic viruses[J].Journal in Computer Virology, 2008,4(3):211-220. [3] SASIREKHA N,HEMALATHA M.A Thorough Investigation on Software Protection Techniques against Various Attacks[J].Bonfring International Journal of Software Engineering and Soft Computing,2012,2(3):10-15. [4] BHATKAR S,DUVARNEY D C,SEKAR R.Address Obfuscation:An Efficient Approach to Combat a Broad Range of MemoryError Exploits[C]∥Usenix Security.2003:105-120. [5] XU J,KALBARCZYK Z,IYER R K.Transparent runtime randomization for security[C]∥International Symposium on Reliable Distributed Systems.2003:260-269. [6] BARRANTES E G,ACKLEY D H,PALMER T S,et al.Randomized instruction set emulation to disrupt binary code injection attacks[C]∥Proceedings of the 10th ACM Conference on Computer and Communications Security.2003:281-289. [7] KC G S,KEROMYTIS A D,PREVELAKIS V.Countering codein-jection attacks with instruction-set randomization[C]∥Procee-dings of the 10th ACM Conference on Computer and Communications Security.2003:272-280. [8] ANCKAERT B,DE SUTTER B,DE BOSSCHERE K.Software piracy prevention through diversity[C]∥Proceedings of the 4th ACM Workshop on Digital Rights Management.2004:63-71. [9] LARSEN P,HOMESCU A,BRUNTHALER S,et al.SoK:Automated software diversity[C]∥2014 IEEE Symposium on Security and Privacy.2014:276-291. [10] COLLBERG C,THOMBORSON C,LOW D.A taxonomy of obfuscating transformations[C]∥Department of Computer Scien-ce.New Zealand,1997:1173-3500. [11] COLLBERG C,THOMBORSON C,LOW D.Manufacturingcheap,resilient,and stealthy opaque constructs[C]∥Procee-dings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.1998:184-196. [12] BARAK B,GOLDREICH O,IMPAGLIAZZO R,et al.On the(im) possibility of obfuscating programs[C]∥Annual International Cryptology Conference.2001:1-18. [13] WEE H.On obfuscating point functions[C]∥Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing.2005:523-532. [14] BENDERSKY D,FUTORANSKY A,NOTARFRANCESCO L,et al.Advanced software protection now.http://www.zentralblatt-math.org/ioport/en/?q=an%3A05767133. [15] LIN D,STAMP M.Hunting for undetectable metamorphic viruses[J].Journal in Computer Virology,2011,7(3):201-214. [16] LINN C,DEBRAY S.Obfuscation of executable code to improve resistance to static disassembly[C]∥Proceedings of the 10th ACM Conference on Computer and Communications Security.2003:290-299. [17] KULKARNI A,METTA R.A New Code Obfuscation Scheme for Software Protection[C]∥ IEEE International Symposium on Service Oriented System Engineering.2014:409-414. [18] WANG C,DAVIDSON J,HILL J,et al.Protection of software-based survivability mechanisms[C]∥International Conference on Dependable Systems and Networks,2001(DSN 2001).2001:193-202. [19] SHACHAM H,PAGE M,PFAFF B,et al.On the effectiveness of address-space randomization[C]∥ACM Conference on Computer and Communications Security.2004:298-307. [20] LARSEN P,BRUNTHALER S,FRANZ M.Security throughdiversity:Are we there yet?[J].IEEE Security & Privacy,2014,12(2):28-35. [21] JUNOD P,RINALDINI J,WEHRLI J,et al.Obfuscator-LLVM:software protection for the masses[C]∥Proceedings of the 1st International Workshop on Software Protection.2015:3-9. [22] SCHAEFER I,RABISER R,CLARKE D,et al.Software diversity:state of the art and perspectives[J].International Journal on Software Tools for Technology Transfer,2012,14(5):477-495. [23] JOSEPH M K.Architectural issues in fault-tolerant,Secure Com-puting Systems[D].Los Angeles:University of California at Los Angeles,1988. [24] KNIGHT J C,LEVESON N G.An experimental evaluation of the assumption of independence in multiversion programming[J].IEEE Transactions on software engineering,1986,SE-12(1):96-109. [25] BITANSKY N,VAIKUNTANATHAN V.Indistinguishability Obfuscation from Functional Encryption[C]∥IEEE 56th An-nual Symposium on Foundations of Computer Science.2015:171-190. [27] WU J X.Mimic Security Defense in Cyber Space [J].Secrecy Science and Technology,2014,10(1):4-9.(in Chinese) 邬江兴.网络空间拟态安全防御[J].保密科学技术,2014,10(1):4-9. [28] PALSBERG J,KRISHNASWAMY S,KWON M,et al.Experien-ce with software watermarking[C]∥16th Annual Conference Computer Security Applications,2000(ACSAC’00).2000:308-316. [29] MAJUMDAR A,MONSIFROT A,T HOMBORSON C.On Evaluating Obfuscatory Strength of Alias-based Transforms using Static Analysis[C]∥International Conference on Advanced Computing and Communications.2006:605-610. [30] YADEGARI B,JOHANNESMEYER B,W HITELY B,et al.A generic approach to automatic deobfuscation of executable code[C]∥2015 IEEE Symposium on Security and Privacy.2015:674-691. [31] SCHRITTWIESER S,KATZENBEISSER S,K IESEBERG P,et al.Covert Computation—Hiding code in code through compile-time obfuscation[J].Computers & Security,2014,42(4):13-26. [32] SEBASTIAN S,KATZENBEISSER S,KIESEBERG P,et al.Covert computation:hiding code in code for obfuscation purposes[C]∥ Acm Sigsac Symposium on Information.2013. [33] SNOW K Z,MONROSE F,DAVI L,et al.Just-in-time codereuse:On the effectiveness of fine-grained address space layout randomization[C]∥2013 IEEE Symposium on Security and Privacy (SP).2013:574-588. |
No related articles found! |
|