1Main A,Oorschot P C.Sottware protection and application security: Understanding the battleground[R]. Heverlee,Belgium:Intemational Course on State of the Art and Evolution of Computer Security and Industrial Cryptography,2003.
2Christian Collberg, Clark Thomborson, Douglas Low. A taxonomy of obfuscating transformations [R]. Department of Com- puter Science,University of Auckland, 1996.
3Low D.Java control flow obfuscation[D].Department of Computer Science,University of Auckland,1998.
4Tim Lindholm, Frank Yellin,Java virtual machine specification [EB/OL]. http://java.sun.com/docs/books/jvrns/index. html.