1G.Wroblewski.General Method of Program Code Obfuscation[D].PhD thesis,Wroclaw University of Technology,Institute of Engi-neering Cybernetics,2002.
2C.Linn and S.Debray.Obfuscation of executable code to improveresistance to static disassembly[C].In Proceedings 10th.ACM Conferenceon Computer and Communications Security(CCS 03),Washington,DC,USA,Oct 2003.
4J.Aycock,R.deGraaf,M.Jacobson.Anti-Disassembly using Cryp-tographic Hash Functions[J].Journal in Computer Virology,2006,Vol 2,No.1,pp.79-85.
二级参考文献5
1Colllberg C., Thomborson C., Low D.. A taxonomy of obfuscating transformations. Department of Computer Science, the University of Auckland: Technical Report #148, 1996
2Burke M., Carini P. R., Choi Jong-Deok. Interprocdural pointer alias analysis. IBM Research Report: RC21055, 1997
3Karnik N.M., Tripathi A.R.. Security in the ajanta system. Software-Practice and Experience, 2000, 30(1): 1~29
4Ghiya R.. Interprocedural analysis in the presence of function pointers. McGill University, Montreal, Quebec, Canada, ACAPS Technical Report: 62,1992