共 17 条
- [1] Schrittwieser S., Katzenbeisser S., Kieseberg P., Et al., Covert computation: Hiding code in code for obfuscation purposes, Proc of the 8th ACM SIGSAC Symp on Information, Computer and Communications Security, pp. 529-534, (2013)
- [2] Balachandran V., Emmanuel S., Potent and stealthy control flow obfuscation by stack based self-modifying code, IEEE Transactions on Information Forensics and Security, 8, 4, pp. 669-681, (2013)
- [3] Cappaert J., Preneel B., Anckaert B., Et al., Towards tamper resistant code encryption: Practice and experience, Proc of the 4th Int Conf on Information Security Practice and Experience, pp. 86-100, (2008)
- [4] Wu Z., Steven G., Xie M., Et al., Mimimorphism: A new approach to binary code obfuscation, Proc of the 17th ACM Conf on Computer and Communications Security (CCS'12), pp. 536-546, (2012)
- [5] Vrba Z., Cryptexec: Next-generation runtime binary encryption using on-demand function extraction
- [6] Vrba Z., Halvorsen P., Griwodz C., Program obfuscation by strong cryptography, Proc of 2010 Int Conf on Availability, Reliability and Security, pp. 242-247, (2010)
- [7] Cappaert J., Kisserli N., Schellekens D., Et al., Self-encrypting code to protect against analysis and tampering, Proc of the 1st Benelux Workshop on Information and Sytem Security (WISSec 2006), (2006)
- [8] Balachandran V., Keong N.W., Emmanuel S., Function level control flow obfuscation for software security, Proc of the 8th Int Conf on Complex, Intelligent and Software Intensive Systems, pp. 133-140, (2014)
- [9] Sharif M., Lanzi A., Giffin J., Et al., Impeding malware analysis using conditional code obfuscation, Proc of the Network and Distributed System Security Symp., pp. 321-333, (2008)
- [10] Jia C., Wang Z., Liu X., Et al., Branch obfuscation: An efficient binary code obfuscation to impede symbolic execution, Journal of Computer Research and Development, 48, 11, pp. 2111-2119, (2011)