4[6]TCG.TPM Main Part 2 TPM Structures,Specffica tion version1.2[DL].www.trustedcomputinggroup.org/specs/TPM,2003,10.
5C.S. Collberg, C.Thomborson. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection[EB/OL]. IEEE Tans. Software Eng., 2002,(8): 735~746.
6H.Chang, M.J.Atallah. Protecting Software Code by Guards[M]. Proc. ACM Workshop Security and Privacy in Digital rights management, ACM Press, 2001. 160~ 175.