共 25 条
- [1] Anckaert B., 2006, P ACM WORKSH DIG RIG, P47
- [2] [Anonymous], 2001, LECT NOTES COMPUTER, DOI DOI 10.1007/3-540-44647-8_2
- [3] Appel A., 2002, PRINCETON U, P2
- [4] Code Obfuscation Against Symbolic Execution Attacks [J]. 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 189 - 200
- [5] Ceccato M., 2017, P 25 IEEE INT C PROG
- [8] Chen TZ, 2006, PROCEEDINGS OF THE 2006 IEEE/ASME INTERNATIONAL CONFERENCE ON MECHATRONIC AND EMBEDDED SYSTEMS AND APPLICATIONS, P26
- [9] Collberg C., 1998, Conference Record of POPL '98: 25th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages, P184, DOI 10.1145/268946.268962
- [10] Collberg C., 1997, A Taxonomy of Obfuscating Transformations