共 50 条
- [2] Three control flow obfuscation methods for Java']Java software [J]. IEE PROCEEDINGS-SOFTWARE, 2006, 153 (02): : 80 - 86
- [4] A Breakthrough in Software Obfuscation [J]. COMMUNICATIONS OF THE ACM, 2016, 59 (05) : 112 - 112
- [5] Incremental Program Obfuscation [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 193 - 223
- [6] Forensic and Software (UN) Obfuscation [J]. PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 416 - 430
- [7] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security [J]. Cybersecurity, 3
- [10] Program obfuscation by strong cryptography [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 242 - 247