共 50 条
- [41] Code obfuscation techniques for metamorphic viruses JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (03): : 211 - 220
- [42] A First Look at Code Obfuscation forWebAssembly PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), 2022, : 140 - 145
- [43] Control code obfuscation by abstract interpretation SEFM 2005: THIRD IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, PROCEEDINGS, 2005, : 301 - 310
- [44] Security Assessment of Code Obfuscation Based on Dynamic Monitoring in Android Things IEEE ACCESS, 2017, 5 : 6361 - 6371
- [45] ASPECT-ORIENTED CODE OBFUSCATION PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING, 2009, : 252 - 257
- [46] Data Hiding Using Code Obfuscation ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
- [47] JHide - A tool kit for code obfuscation Int. Association of Sci. and Technol. for Development, IASTED, 1600, 133-138 (2004):
- [48] A comparable code obfuscation framework measuring efficiency based on abstract interpretation Jisuanji Xuebao/Chinese Journal of Computers, 2007, 30 (05): : 806 - 814
- [50] Zero-knowledge and code obfuscation ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 443 - 457