摘要
文章介绍了混淆算法的力量、弹性、执行代价和隐蔽性等性能及其度量,简要叙述了各种混淆变换,总结了反混淆和对混淆算法的攻击方法,提出了若干可能的研究方向。
Measures of potency, resilience, execution cost and stealth are introduced at the beginning. Then a synopsis and a review of obfuscating transformations are given. Furthermore, attacks against obfuscating algorithms and deobfuscation are summarized. Some suggestions about future work are proposed in the end.
出处
《电脑与信息技术》
2008年第1期46-48,53,共4页
Computer and Information Technology
关键词
混淆变换
移动代码保护
知识产权保护
obfuscating transformations
mobile code protection
intellectual property protection