(下转第188页)
(上接第181页)
参考文献
[1]Collerg C,Thomborson C,Low D.A Taxonomy of Obfuscating Transformations[D].Auckland,USA:University of Auckland,1997.
[2]邵孟良,齐德昱,刘东文.一种多态内联代码混淆算法[J].计算机应用研究,2015,32(6):1787-1790,1800.
[3]王志,贾春福,刘伟杰,等.一种抵抗符号执行的路径分支混淆技术[J].电子学报,2015,43(5):870-878.
[4]Low D.Java Control Flow Obfuscation[D].Auckland,USA:University of Auckland,1998.
[5]宋亚奇,李莉.基于随机插入策略的Java混淆器设计与实现[J].计算机工程与设计,2009,30(4):887-889.
[6]杨乐,周强强,薛锦云.基于垃圾代码的控制流混淆算法[J].计算机工程,2011,37(12):23-25.
[7]蒋华,刘勇,王鑫.基于控制流的代码混淆技术研究[J].计算机应用研究,2013,30(3):897-899.
[8]Harrison W A,Magel K I.A Complexity Measure Based on Nesting Level[J].ACM SIGPLAN Notices,1981,16(3):63-74.
[9]陈代梅,范希辉,朱静,等.基于同余方程和中国剩余定理的混淆算法[J].计算机应用研究,2015,32(2):485-488.
[10]苏庆,吴伟民,李忠良,等.混沌不透明谓词在代码混淆中的研究与应用[J].计算机科学,2013,40(6):155-159.
[11]Majumdar A,Thomborson C.Manufacturing Opaque Predicates in Distributed Systems for Code Obfusca-tion[C]//Proceedings of the 29th Australasian Com-puter Science Conference.New York,USA:ACM Press,2006:187-196.
[12]Anckaert B,Madou M,de Sutter B,et al.Program Obfuscation:A Quantitative Approach[C]//Proceedings of ACM Workshop on Quality of Protection.New York,USA:ACM Press,2007:15-20.
[13]Tsai Hsin-yi,Huang Yulun,Wagner D.A Graph Approach to Quantitative Analysis of Control-flow Obfuscating Transformations[J].IEEE Transactions on Information Forensics and Security,2009,4(2):257-267.
[14]谢鑫,刘粉林,芦斌,等.基于多层次属性加权的代码混淆有效性量化评估[J].计算机科学,2015,42(3):167-173.
[15]赵玉洁,汤战勇,王妮,等.代码混淆算法有效性评估[J].软件学报,2012,23(3):700-711.
[16]Hou Tingwei,Chen Xiangyang,Cai Mingxiu.Three Control Flow Obfuscation Methods for Java Software[J].IEE Proceedings of Software,2006,153(2):80-86.
[17]Lengauer T,Tarjan R E.A Fast Algorithm for Finding Dominators in a Flowgraph[J].ACM Transactions on Programming Languages and Systems,1979,1(1):121-141.
编辑顾逸斐 |