期刊文献+

Experiment with control code obfuscation 被引量:2

Experiment with control code obfuscation
下载PDF
导出
机构地区 Computer Department
出处 《通讯和计算机(中英文版)》 2007年第8期59-62,共4页 Journal of Communication and Computer
关键词 程序分析 字节密码 密码模糊 软件 程序控制 数据安全 code obfuscation program analysis byte code
  • 相关文献

同被引文献8

  • 1Main A,Oorschot P C.Sottware protection and application security: Understanding the battleground[R]. Heverlee,Belgium:Intemational Course on State of the Art and Evolution of Computer Security and Industrial Cryptography,2003.
  • 2Christian Collberg, Clark Thomborson, Douglas Low. A taxonomy of obfuscating transformations [R]. Department of Com- puter Science,University of Auckland, 1996.
  • 3Low D.Java control flow obfuscation[D].Department of Computer Science,University of Auckland,1998.
  • 4Tim Lindholm, Frank Yellin,Java virtual machine specification [EB/OL]. http://java.sun.com/docs/books/jvrns/index. html.
  • 5Apache Software Group. BCEL [EB/OL] .http://jakarta.apache. org/bcel/.
  • 6Xavier Leroy.Java bytecode verification: algorithms and formalizations [J]. Journal of Automated Reasoning, 2003,30 (3-4): 235-269.
  • 7Alfred V Aho,Ravi Sethi,Jeffrey D Ullman.Compilers,principles,techniques and tools[M].Addison-Wesley, 1986.
  • 8王一宾,陈意云.代码迷惑技术研究进展[J].吉林大学学报(信息科学版),2008,26(4):386-393. 被引量:10

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部