共 17 条
[1]
Formal Verification of Control-Flow Graph Flattening
[J].
PROCEEDINGS OF THE 5TH ACM SIGPLAN CONFERENCE ON CERTIFIED PROGRAMS AND PROOFS (CPP'16),
2016,
:176-187
[3]
Blazy Sandrine, 2012, SSP 2012
[4]
Collberg C., 2009, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection
[5]
Collberg Christian, 2014, TIGRESS C DIVERSIFIE
[7]
Drape S, 2007, LECT NOTES COMPUT SC, V4779, P299
[8]
Defeating MBA-based Obfuscation
[J].
SPRO'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON SOFTWARE PROTECTION,
2016,
:27-37
[9]
Eyrolles Ninon, 2017, THESIS
[10]
Griswold M, 2007, BIOL REPROD, P61