共 69 条
[11]
Blazakis Dionysus, 2010, P 4 USENIX WORKSH OF
[12]
Chew M., 2002, Technical report
[13]
Cohen F. B., 1993, Computers & Security, V12, P565, DOI 10.1016/0167-4048(93)90054-9
[14]
Collberg C., 1998, Conference Record of POPL '98: 25th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages, P184, DOI 10.1145/268946.268962
[15]
Collberg C., 1997, A Taxonomy of Obfuscating Transformations
[16]
Collberg C, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P319
[17]
Coppens B., 2013, T ARCHITECTURE CODE, V9
[19]
Cowan C, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P63
[20]
Booby Trapping Software
[J].
PROCEEDINGS OF THE 2013 NEW SECURITY PARADIGMS WORKSHOP (NSPW'13),
2013,
:95-105