[1] |
奇安信代码安全实验室. 2022 中国软件供应链安全分析报告[EB].
|
|
Qi An Xin Code Security Lab. 2022 China software supply chain security analysis report[EB].
|
[2] |
BSA Global Software Survey. Software management:security imperative,business opportunity[EB].
|
[3] |
张汉宁 . 基于精简指令集的软件保护虚拟机技术研究[D]. 西安:西北大学, 2010.
|
|
ZHANG H N . Research on software protection virtual machine technology based on reduced instruction set[D]. Xi'an:Northwest University, 2010.
|
[4] |
SHERIDAN B , SHERR M . On manufacturing resilient opaque constructs against static analysis[J]. Springer International Publishing, 2016.
|
[5] |
COLLBERG C , THOMBORSON C , LOW D . A taxonomy of obfuscating transformations[J]. Technical Report, 1997.
|
[6] |
李成扬, 黄天波, 陈夏润 ,等. LLVM 中间语言的控制流混淆方案[J]. 计算机工程与应用, 2023,(4): 1-8.
|
|
LI C Y , HUANG T B , CHEN X R ,et al. Control flow obfuscation scheme for LLVM intermediate languages[J]. Computer Engineering and Applications, 2023,(4): 1-8.
|
[7] |
LáSZLó T , KISS A . Obfuscating C++ programs via control flow flattening[R]. 2009.
|
[8] |
ROLLES R . Unpacking virtualization obfuscators[C]// Proceedings of the 3rd USENIX Conference on Offensive Technologies. 2009.
|
[9] |
KUANG K , TANG Z , GONG X ,et al. Exploiting dynamic scheduling for VM-based code obfuscation[C]// 2017 IEEE Trustcom/BigDataSE/I SPA. 2017.
|
[10] |
陈耀阳 . 基于代码混淆的软件保护技术研究与实现[D]. 南京:南京邮电大学, 2021.
|
|
CHEN Y Y . Research and implementation of software protection technology based on code obfuscation[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2021.
|
[11] |
房鼎益, 张恒, 汤战勇 ,等. 一种抗语义攻击的虚拟化软件保护方法[J]. 工程科学与技术, 2017,49(1): 159-168.
|
|
FANG D Y , ZHANG H , TANG Z Y ,et al. DAS-VMP:a virtual machine-based software protection method for defending against semantic attacks[J]. Advanced Engineering Sciences, 2017,49(1): 159-168.
|
[12] |
汤战勇, 李光辉, 房鼎益 ,等. 一种具有指令集随机化的代码虚拟化保护系统[J]. 华中科技大学学报(自然科学版), 2016,44(3): 28-33.
|
|
TANG Z Y , LI G H , FANG D Y ,et al. Code virtualized protection system with instruction set randomization[J]. Journal of Huazhong University of Science and Technology(Natural Science Edition), 2016,44(3): 28-33.
|
[13] |
COLLBERG C , THOMBORSON C , LOW D . Manufacturing cheap,resilient,and stealthy opaque constructs[C]// Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL ’98). 1998: 184-196.
|
[14] |
袁征, 冯雁, 温巧燕 ,等. 构造一种新的混淆 Java 程序的不透明谓词[J]. 北京邮电大学学报, 2007,30(6): 103-106.
|
|
YUAN Z , FENG Y , WEN Q Y ,et al. Manufacture of a new opaque predicate for java programs[J]. Journal of Beijing University of Posts and Telecom, 2007,30(6): 103-106.
|
[15] |
MOSER A , KRUEGEL C , KIRDA E . Limits of static analysis for malware detection[C]// Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). 2007.
|
[16] |
TIELLA R , CECCATO M . Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscation[C]// 2017 IEEE 24th International Conference on Software Analysis,Evolution and Reengineering (SANER). 2017: 182-192.
|
[17] |
SHARIF M , LANZI A , GIFFIN J ,et al. Impeding malware analysis using conditional code obfuscation[C]// Proceedings of the Network and Distributed System Security Symposium (NDSS 2008). 2008.
|
[18] |
ZHU W , THOMBORSON C . A provable scheme for homomorphic obfuscations in software security[R]. ACTA Press, 2005.
|
[19] |
ARBOIT G . A method for watermarking Java programs via opaque predicates[C]// Proc Int Conf Electronic Commerce Research, 2002.
|
[20] |
WANG Z , MING J , JIA C ,et al. Linear obfuscation to combat symbolic execution[C]// European Symposium on Research in Computer Security. 2011.
|
[21] |
付蒙 . 抵抗符号执行的不透明谓词混淆技术研究[D]. 西安:西安电子科技大学, 2019.
|
|
FU M . Research on opaque predicate-based obfuscations against symbolic execution[D]. Xi’an:Xidian University, 2019.
|
[22] |
KING J C . Symbolic execution and program testing[J]. Communications of the ACM, 1976,19(7): 385-394.
|
[23] |
MING J , XU D , WANG L ,et al. LOOP:logic-oriented opaque predicate detection in obfuscated binary code[C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015: 757-768.
|
[24] |
YADEGARI B , JOHANNESMEYER B , WHITELY B ,et al. A generic approach to automatic deobfuscation of executable code[C]// 2015 IEEE Symposium on Security and Privacy. 2015: 674-691.
|
[25] |
BARDIN S , DAVID R , MARION J Y . Backward-bounded DSE:targeting infeasibility questions on obfuscated codes[C]// 2017 IEEE Symposium on Security and Privacy (SP). 2017: 633-651.
|
[26] |
BANESCU S , COLLBERG C , GANESH V ,et al. Code obfuscation against symbolic execution attacks[C]// Proceedings of the 32nd Annual Conference on Computer Security Applications. 2016: 189-200.
|
[27] |
王国俊 . 有理数、无理数与实数[J]. 数学的实践与认识, 1998(3): 258-266.
|
|
WANG G J . Rational,irrational and numbers[J]. Mathematics in Practice and Theory, 1998(3): 258-266.
|