[1]Tang Zhanyong,Wang Huaijun, Fang Dingyi, et al. Research on software protection RISCbased virtual machine technology[J]. Microelectronics & Computer, 2011, 28(8):13.(in Chinese)
[2]Bughoho. Virtual machine technology subject argumentation[EB/OL]. [20070707]. http://bbs.pediy.com/showthread. php?t =47633&tcatid=60.(in Chinese)
[3]Shu Bocheng, Li Yichao, Cao Yue, et al. Research on software protection based on virtual machine[J].Computer Engineering & Science, 2008, 30(A1):2528.(in Chinese)
[4]Duan Gang. Encrypt and decrypt[M]. Beijing:Publishing House of Electronics Industry, 2008.(in Chinese)
[5]Li Lu, Liu Qiuju, Xu Tingrong. On unpacking technology for PE files[J]. Computer Applications and Software, 2010, 27(9):279282.(in Chinese)
[6]Wang Haiping, Cao Lin, Sun Guozhi, et al. Study of stochastic junk code encryption algorithm [J]. Journal of Computer Applications, 2006, 26(2):338340.(in Chinese)
[7]Sun Guozi, Cai Qiang, Cheng Danwei, et al. Study on encryption algorithm of subfunction junk code [J]. Computer Engineering and Applications, 2009, 45(3):130132.(in Chinese)
[8]Kruegel C, Robertson W, Valeur F, et al.Static disassembly of obfuscated binaries[C]∥Proc of the 13th Conference on USENIX Security Symposium,2004:18.
[9]Schwarz B, Debray S, Andrews G. Disassemble of executable code revisited[C]∥Proc of the 9th Working Conference on Reverse Engineering, 2002:4554.
附中文参考文献:
[1]汤战勇, 王怀军, 房鼎益, 等. 基于精简指令集的软件保护虚拟机技术研究与实现[J]. 微电子学与计算机, 2011, 28(8):13.
[2]Bughoho. 虚拟机技术专题讨论[EB/OL]. [20070707]. http://bbs.pediy.com/showthread.php?t=47633&tcatid=60.
[3]舒柏程, 李毅超, 曹跃,等. 基于虚拟机的软件保护技术研究[J]. 计算机工程与科学, 2008, 30(A1):2528.
[4]段钢. 加密与解密[M]. 北京:电子工业出版社. 2008.
[5]李露, 刘秋菊, 徐汀荣. PE文件中脱壳技术的研究[J]. 计算机应用与软件, 2010, 27(9):279282.
[6]王海平, 曹林, 孙国梓, 等. 随机花指令加密算法研究[J]. 计算机应用, 2006, 26(2):338340.
[7]孙国梓, 蔡强, 陈丹伟. 子程序花指令加密算法研究[J]. 计算机工程与应用, 2009, 45(3):130132. |