[1] |
AKHUNZADA A , SOOKHAK M , ANUAR N ,et al. Man-at-the-end attacks:analysis,taxonomy,human aspects,motivation and future directions[J]. Journal of Network and Computer Applications, 2015,48(6): 44-57.
|
[2] |
VAN DEN BROECK J , COPPENS B , DE SUTTER B . Flexible software protection[J]. Computers & Security, 2022,10(2): 6-36.
|
[3] |
耿普, 祝跃飞 . 一种基于分支条件混淆的代码加密技术[J]. 计算机研究与发展, 2019,56(10): 2183-2192.
|
|
GENG P , ZHU Y F . A code encrypt technique based on branch condition obfuscation[J]. Journal of Computer Research and Development, 2019,56(10): 2183-2192.
|
[4] |
陈喆, 王志, 王晓初 ,等. 基于代码移动的二进制程序控制流混淆方法[J]. 计算机研究与发展, 2015,52(8): 1902-1909.
|
|
CHEN Z , WANG Z , WANG XC ,et al. Using code mobility to obfuscate control flow in binary codes[J]. Journal of Computer Research and Development, 2015,52(8): 1902-1909.
|
[5] |
AHIRE P , ABRAHAM J . Mechanisms for source code obfuscation in C:novel techniques and implementation[C]// 2020 International Conference on Emerging Smart Computing and Informatics. 2020.
|
[6] |
PIZZOLOTTO D , FELLIN R , CECCATO M . OBLIVE:seamless code obfuscation for Java programs and Android Apps[C]// 2019 IEEE 26th International Conference on Software Analysis,Evolution and Reengineering. 2019.
|
[7] |
VAN DEN BROECK J , COPPENS B , DE SUTTER B . Obfuscated integration of software protections[J]. International Journal of Information Security, 2021,20(1): 73-101.
|
[8] |
CECCATO M , ANDREA C , PAOLO F ,et al. A large study on the effect of code obfuscation on the quality of Java code[J]. Empirical Software Engineering, 2015,20(6): 1486-1524.
|
[9] |
LARSEN P , HOMESCU A , BRUNTHALER S ,et al. SoK:automated software diversity[C]// Symposium on Security and Privacy. 2014.
|
[10] |
XU H , ZHOU Y , MING J ,et al. Layered obfuscation:a taxonomy of software obfuscation techniques for layered security[J]. Cybersecurity, 2020,3(1): 1-18.
|
[11] |
PENG Y , CHEN Y , SHEN B . An adaptive approach to recommending obfuscation rules for java bytecode obfuscators[C]// 2019 IEEE 43rd Annual Computer Software and Applications Conference. 2019.
|
[12] |
COLLBERG C , THOMBORSON C , LOW D . A taxonomy of obfuscating transformations[R]. 1997.
|
[13] |
ANCKAERT B , MADOU M , DE SUTTER B ,et al. Program obfuscation:quantitative approach[C]// ACM Workshop on Quality of Protection, 2007.
|
[14] |
KIRK SR , JENKINS S . Information theory-based software metrics and obfuscation[J]. Journal of Systems and Software, 2004,72(2): 179-186.
|
[15] |
MOHSEN R , PINTO AM . Evaluating obfuscation security:A quantitative approach[C]// International Symposium on Foundations and Practice of Security. 2016.
|
[16] |
MOHSEN R . Quantitative measures for code obfuscation security[D]. London:Imperial College London, 2016.
|
[17] |
RODRíGUEZ-VELIZ M , NU?EZ-MUSA Y , LIMA R S . Call graph obfuscation and diversification:an approach[J]. IET Inf Secur, 2020,14(2): 241-252.
|
[18] |
TSAI HY , HUANG YL , WAGNER D . A graph approach to quantitative analysis of control-flow obfuscating transformations[J]. IEEE Transactions on Information Forensics and Security, 2009,4(2): 257-267.
|
[19] |
GAO D , REITER MK , SONG D . BinHunt:automatically finding semantic differences in binary programs[C]// International Conference on Information and Communications Security. 2008.
|
[20] |
LUO L , MING J , WU D ,et al. Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection[C]// ACM Sigsoft International Symposium on Foundations of Software Engineering. 2014.
|
[21] |
PUCELLA R , SCHNEIDER FB . Independence from obfuscation:a semantic framework for diversity[J]. Computers & Security, 2010,18(5): 701-749.
|
[22] |
DALLA M , GIACOBAZZI R . Semantic-based code obfuscation by abstract interpretation[C]// International Colloquium on Automata,Languages,and Programming. 2005.
|
[23] |
VITICCHIE A , REGANO L , TORCHIANO M ,et al. Assessment of source code obfuscation techniques[C]// International Working Conference on Source Code Analysis and Manipulation. 2016.
|
[24] |
CECCATO M , DI PENTA M , NAGRA J ,et al. The effectiveness of source code obfuscation:an experimental assessment[C]// International Conference on Program Comprehension. 2009.
|
[25] |
BANESCU S , COLLBERG C , GANESH V ,et al. Code obfuscation against symbolic execution attacks[C]// Annual Conference on Computer Security Applications. 2016.
|
[26] |
MAJUMDAR A , DRAPE S , THOMBORSON C . Metrics-based evaluation of slicing obfuscations[C]// International Symposium on Information Assurance and Security. 2007.
|
[27] |
MOLNAR D , LI XC , WAGNER DA . Dynamic test generation to find integer bugs in x86 binary linux programs[C]// USENIX Security Symposium. 2009.
|
[28] |
WANG Z , MING J , JIA C , GAO D . Linear obfuscation to combat symbolic execution[C]// European Symposium on Research in Computer Security. 2011.
|
[29] |
ZUSE H . Software complexity:measures and methods[R]. Berlin,Walter de Gruyter GmbH & Co KG, 1991.
|
[30] |
KARNICK M , MACBRIDE J , MCGINNIS S ,et al. A qualitative analysis of Java obfuscation[C]// IASTED International Conference on Software Engineering and Applications. 2006.
|