[1]Mysterie.A Python 2.7 byte-code decompiler[EB/OL].[2017-03-10].https://github.com/wibiti/uncompyle2.
[2]Niwit.Decompyle-Python decompiler[EB/OL].[2017-03-10].https://sourceforge.net/projects/decompyle/?source=typ_redirect.
[3]Extremecoders.Python 1.0-3.4 bytecode decompiler[EB/OL].[2017-03-10].https://sourceforge.net/projects/easypytho ndecompiler/.
[4]蒋华,刘勇,王鑫.基于控制流的代码混淆技术研究[J].计算机应用研究,2013,30(3):897-899.
[5]杨乐,周强强,薛锦云.基于垃圾代码的控制流混淆算法[J].计算机工程,2011,37(12):23-25.
[6]KUZURIN N,SHOKUROV A,VARNOVSKY N,et al.On the concept of software obfuscation in computer security[C]//Proceedings of International Conference on Information Security.Washington D.C.,USA:IEEE Press,2007:281-298.
[7]徐海银,雷植洲,李丹.代码混淆技术研究[J].计算机与数字工程,2007,35(10):4-7.
[8]鲍福良,彭俊艳,方志刚.Java类文件保护方法综述[J].计算机系统应用,2007,16(6):124-126.
[9]Py2exe:A Python distutils extension which converts Python scripts into executable windows programs[EB/OL].[2017-03-10].http://www.py2exe.org/.
[10]陈明奇,钮心忻.数字水印的研究进展和应用[J].通信学报,2001,22(5):71-79.
[11]孙圣和,陆哲明.数字水印处理技术[J].电子学报,2000,28(8):85-90.
[12]陈晗,赵轶群,缪亚波.Java字节码的水印嵌入[J].计算机应用,2003,23(9):96-98.
[13]COLLBERG C S,THOMBORSON C.Watermarking tamper-proofing and obfuscation[J].IEEE Transactions on Software Engineering,2000,28(8):735-746.
[14]HAMILTON J,DANICIC S.An evaluation of static Java bytecode watermarking[EB/OL].[2017-02-25].https://jameshamilton.eu/sites/default/files/JavaBytecodeWatermar kingSurvey.pdf.
[15]KUMAR K,KEHAR V,KAUR P.An evaluation of dynamic Java bytecode software watermarking algori-thms[J].International Journal of Security and Its Applications,2016,10(7):147-156.
[16]KHOLIA D,WEGRZYN P.Looking inside the (Drop) box[EB/OL].[2017-03-01].https://www.usenix.org/system/files/conference/woot13/woot13-kholia.pdf.
[17]J.C.斯普拉德林.通过操作码随机化的安全:CN 102592082 A[P].2012-07-18.
[18]Omab.Python-obfuscation[EB/OL].[2017-03-10].https://github.com/citrusbyte/python-obfuscation.
[19]STALLINGS M.Cryptography and network security[M].王章宜,杨敏,杜瑞颖,等,译.北京:电子工业出版社,2012.
[20]MODZELEWSKI K.Microbenchmarks[EB/OL].[2017-03-10].https://github.com/dropbox/pyston/tree/master/micro benchmarks.
[21]GUELTON S.Building an obfuscated Python interpreter:we need more opcodes[EB/OL].[2017-03-10].https://blog.quarkslab.com/building-an-obfuscated-python-interpreter-we-need-more-opcodes.html.
|