1 |
HAN S, SHIN W, PARK J H, et al. A bad dream: subverting trusted platform module while you are sleeping[C]//Proceedings of the 27th USENIX Security Symposium (USENIX Security 18). New York, USA: ACM Press, 2018: 1229-1246.
|
2 |
MA H Y , JIA C F , LI S J , et al. Xmark: dynamic software watermarking using Collatz conjecture. IEEE Transactions on Information Forensics and Security, 2019, 14 (11): 2859- 2874.
|
3 |
BERLATO S , CECCATO M . A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps. Journal of Information Security and Applications, 2020, 52, 102463.
|
4 |
MERLO A, RUGGIA A, SCIOLLA L, et al. ARMAND: anti-repackaging through multi-pattern anti-tampering based on native detection[EB/OL]. [2023-07-20]. https://arxiv.org/abs/2012.09292v2.
|
5 |
PFEFFER K, MAI A, DABROWSKI A, et al. On the usability of authenticity checks for hardware security tokens[C]//Proceedings of the 30th USENIX Security Symposium (USENIX Security 21). Washington D. C., USA: IEEE Press, 2021: 37-54.
|
6 |
HU H C , WU J C , WANG Z P , et al. Mimic defense: a designed-in cybersecurity defense framework. IET Information Security, 2018, 12 (3): 226- 237.
|
7 |
邬江兴. 网络空间拟态防御研究. 信息安全学报, 2016, 1 (4): 1- 10.
|
|
WU J X . Research on cyber mimic defense. Journal of Cyber Security, 2016, 1 (4): 1- 10.
|
8 |
CARVALHO M , FORD R . Moving-target defenses for computer networks. IEEE Security & Privacy, 2014, 12 (2): 73- 76.
|
9 |
庞建民, 张宇嘉, 张铮, 等. 拟态防御技术结合软件多样化在软件安全产业中的应用. 中国工程科学, 2016, 18 (6): 74- 78.
|
|
PANG J M , ZHANG Y J , ZHANG Z , et al. Applying a combination of mimic defense and software diversity in the software security industry. Strategic Study of Chinese Academy of Engineering, 2016, 18 (6): 74- 78.
|
10 |
姚东, 张铮, 张高斐, 等. 多变体执行安全防御技术研究综述. 信息安全学报, 2020, 5 (5): 77- 94.
|
|
YAO D , ZHANG Z , ZHANG G F , et al. A survey on multi-variant execution security defense technology. Journal of Cyber Security, 2020, 5 (5): 77- 94.
|
11 |
LARSEN P, HOMESCU A, BRUNTHALER S, et al. SoK: automated software diversity[C]//Proceedings of IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2014: 276-291.
|
12 |
FRANZ M . Making multivariant programming practical and inexpensive. IEEE Security & Privacy, 2018, 16 (3): 90- 94.
|
13 |
张宇嘉, 张啸川, 庞建民. 代码混淆技术研究综述. 信息工程大学学报, 2017, 18 (5): 635- 640.
|
|
ZHANG Y J , ZHANG X C , PANG J M . Survey on code obfuscation research. Journal of Information Engineering University, 2017, 18 (5): 635- 640.
|
14 |
LÁSZLÓ T, KISS Á. Obfuscating C + + programs viacontrol flow flattening[C]//Proceedings of the 10th Symposium on Programming Languages and Software Tools. [S. l. ]: AAAI Press, 2009: 3-19.
|
15 |
WANG C X, DAVIDSON J, HILL J, et al. Protection of software-based survivability mechanisms[C]//Proceedings of International Conference on Dependable Systems and Networks. Washington D. C., USA: IEEE Press, 2001: 193-202.
|
16 |
COLLBERG C, THOMBORSON C, LOW D. Manufacturing cheap, resilient, and stealthy opaque constructs[C]//Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York, USA: ACM Press, 1998: 184-196.
|
17 |
COHEN F B . Operating system protection through program evolution. Computers & Security, 1993, 12 (6): 565- 584.
|
18 |
|
19 |
JUNOD P, RINALDINI J, WEHRLI J, et al. Obfuscator-LLVM—software protection for the masses[C]//Proceedings of the 1st International Workshop on Software Protection. Washington D. C., USA: IEEE Press, 2015: 3-9.
|
20 |
廖方圆, 甘植旺. Android系统签名的漏洞分析与检测. 计算机工程, 2019, 45 (8): 25- 30.
doi: 10.19678/j.issn.1000-3428.0055156
|
|
LIAO F Y , GAN Z W . Vulnerability analysis and detection of Android system signature. Computer Engineering, 2019, 45 (8): 25- 30.
doi: 10.19678/j.issn.1000-3428.0055156
|
21 |
祁龙云, 吕小亮, 路红, 等. 汇编级顺序语句块的自动形式化规约及其验证. 计算机工程, 2019, 45 (10): 64-69, 77.
doi: 10.19678/j.issn.1000-3428.0053152
|
|
QI L Y , LÜ X L , LU H , et al. Automatic formal specification and its verification of assembly-level sequential statement blocks. Computer Engineering, 2019, 45 (10): 64-69, 77.
doi: 10.19678/j.issn.1000-3428.0053152
|
22 |
|
23 |
|
24 |
|
25 |
|
26 |
李成扬, 黄天波, 陈夏润, 等. LLVM中间语言的控制流混淆方案. 计算机工程与应用, 2023, 59 (8): 263- 269.
|
|
LI C Y , HUANG T B , CHEN X R , et al. Control flow obfuscation scheme for LLVM intermediate languages. Computer Engineering and Applications, 2023, 59 (8): 263- 269.
|
27 |
陈耀阳, 陈伟. 采用隐式跳转的控制流混淆技术. 计算机工程与应用, 2021, 57 (20): 125- 132.
|
|
CHEN Y Y , CHEN W . Control flow obfuscation technology based on implicit jump. Computer Engineering and Applications, 2021, 57 (20): 125- 132.
|
28 |
田大江, 李成扬, 黄天波, 等. 基于底层虚拟机的标识符混淆方法. 计算机应用, 2022, 42 (8): 2540- 2547.
|
|
TIAN D J , LI C Y , HUANG T B , et al. Identifier obfuscation method based on low level virtual machine. Journal of Computer Applications, 2022, 42 (8): 2540- 2547.
|