共 15 条
[1]
Anckaert B, 2007, LECT NOTES COMPUT SC, V4437, P232
[3]
Christodorescu M, 2003, P 12 C USENIX SEC S, V12, P12, DOI DOI 10.21236/ADA449067
[4]
Cmelik B., 1994, Performance Evaluation Review, V22, P128, DOI 10.1145/183019.183032
[5]
Coogan K, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P275
[6]
DUBE TE, 2006, METAMORPHISM SOFTWAR
[7]
Engler D. R., 1995, Operating Systems Review, V29, P251, DOI 10.1145/224057.224076
[8]
Exploiting self-modification mechanism for program protection
[J].
27TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS,
2003,
:170-179
[9]
Kolbitsch C, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P285
[10]
Linn C., 2003, P 10 ACM C COMP COMM, P290, DOI DOI 10.1145/948109.948149