共 50 条
- [1] Assessment of Source Code Obfuscation Techniques [J]. 2016 IEEE 16TH INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM), 2016, : 11 - 20
- [2] Implementation of Obfuscation Technique on PHP Source Code [J]. 2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI 2018), 2018, : 738 - 742
- [3] Implementation of an Obfuscation Tool for C/C plus plus Source Code Protection on the XScale Architecture [J]. SOFTWARE TECHNOLOGIES FOR EMBEDDED AND UBIQUITOUS SYSTEMS, PROCEEDINGS, 2008, 5287 : 406 - +
- [5] A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques [J]. Empirical Software Engineering, 2014, 19 : 1040 - 1074
- [6] Code obfuscation techniques for metamorphic viruses [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (03): : 211 - 220
- [7] Different Obfuscation Techniques for Code Protection [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 757 - 763
- [8] Source Code Obfuscation for Smart Contracts [J]. 2020 27TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2020), 2020, : 513 - 514
- [9] Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 7 - 19
- [10] The malicious code hiding techniques, code obfuscation problem [J]. 12TH IEEE INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA 2014), 2014, : 181 - 185