[1] |
Van Oorschot P C. Revisiting Software Protection[C]∥Proc of the 6th International Information Security Conference (ISC’03), 2006:113.
|
[2] |
Collberg C,Nagra J. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection[M]. San Francisco: No Starch Press,2002.
|
[3] |
Tamperproofing for Program Protection[M].AddisonWesley Professional, 2009.
|
[4] |
Debray S,Evans W. ProfileGuided Code Compression[C]∥Proc of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2002:95105.
|
[5] |
Linn C,Debray S. Obfuscation of Executable Code to Improve Resistance to Static Disassembly[C]∥Proc of the 10th ACM Conference on Computer and Communications Security, 2003:290299.
|
[6] |
Lin H, Mo Xuansheng, Gao Ying. Based on RSA and SelfModifying Mechanism of Software Protection[C]∥Proc of the 2010 International Symposium on Parallel and Distributed Processing with Applications,2010:474477.
|
[7] |
Ansel J, Marchenki P,Erlingsson U,et al. LanguageIndependent Sandboxing of JustinTime Compilation and SelfModifying Code[C]∥Proc of the 32nd ACM SIGPLIN Conference on Programming Language Design and Implemention,2011:355366.
|
[8] |
Collberg C, Thomborson C.Watermarking,TamperProofing, and ObfuscationTools for Software Protection[J]. IEEE Transactions on Software Engineering, 2002,28(6):735746.
|
[9] |
Cappaert J, Preneel B, Anckaert B, et al. Towards Tamper Resistant Code Encryption: Practice and Experience[J].LNCS, 2008j,4991:86100.
|
[10] |
Kanzaki Y, Monden A,Nakamura M,et al. Exploiting SelfModification Mechanism for Program Protection[C]∥Proc of the 27th Annual Computer Software and Applications Conference,2003:170179.
|
[11] |
Aho A V, Sethi R,Ullman J D. Compilers: Principles, Techniques and Tools[M]. AddisonWesley,2007.
|
[12] |
Kanzaki Y, Monden A, Nakamura M,et al. Program Camouflage: A Systematic Instruction Hiding Method for Protecting Secrets[C]∥Proc of World Congress on Science,Engineering and Technology,2009:557563.
|
[13] |
Kanzaki Y,Monden A. A Software Protection Method Based on TimeSensitive Code and SelfModification Mechanism[C]∥Proc of IASTED’10,2010:325331.
|
[14] |
Madou M, Anckaert B,Moseley P,et al. Software Protection Through Dynamic Code Mutation[C]∥Proc of the International Workshop on Information Security Applications, 2006:194206.
|
[15] |
Anckaert B, Madou M,de Bosschere K. A Model for Selfmodifying Code[C]∥Proc of the 8th International Conference on Information Hiding,2007:232248.
|