共 34 条
[1]
Anckaert B, 2007, QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, P15
[2]
Baker R.D., 1995, Randomization Tests
[3]
Ceccato M, 2009, EFFECTIVENESS SOURCE
[4]
Ceccato M, 2007, SEVENTH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, P27
[5]
The Effectiveness of Source Code Obfuscation: an Experimental Assessment
[J].
ICPC: 2009 IEEE 17TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION,
2009,
:178-+
[6]
Chang H, 2002, ACM WORKSH SEC PRIV
[7]
Cohen J., 1988, Statistical power analysis for the behavioral sciences, VSecond
[8]
Collberg C., 1998, Conference Record of POPL '98: 25th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages, P184, DOI 10.1145/268946.268962
[9]
Collberg C, 2009, SUREPTITIOUS SOFTWAR
[10]
Collberg C., 1997, A Taxonomy of Obfuscating Transformations