共 22 条
- [1] Albawi S, 2017, I C ENG TECHNOL
- [2] Code Obfuscation Against Symbolic Execution Attacks [J]. 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 189 - 200
- [3] Banescu S, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P661
- [4] Bensaoud A., 2020, International Journal of Network Security, V22, P1022
- [5] Bishop C.M., 2006, Pattern Recognition and Machine Learning
- [6] Collberg C., 2009, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection
- [7] Coogan K, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P275
- [8] Jones L, 2018, 2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P155, DOI 10.1109/CCWC.2018.8301720
- [9] Obfuscator-LLVM - Software Protection for the Masses [J]. 2015 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SOFTWARE PROTECTION (SPRO), 2015, : 3 - 9
- [10] Kabanga E. K., 2017, J COMP COM, V6