메뉴 건너뛰기




Volumn , Issue , 1998, Pages 28-38

Breaking abstractions and unstructuring data structures

Author keywords

[No Author keywords available]

Indexed keywords

CODE CONVERTERS; CRYPTOGRAPHY; DATA REDUCTION; DATA STRUCTURES; DISTRIBUTED COMPUTER SYSTEMS; HIGH LEVEL LANGUAGES; PROGRAM COMPILERS;

EID: 0031620963     PISSN: 10748970     EISSN: None     Source Type: None    
DOI: 10.1109/ICCL.1998.674154     Document Type: Conference Paper
Times cited : (120)

References (21)
  • 1
    • 85176669226 scopus 로고
    • D. Aucsmith Information Hiding May/June 1986 Tamper resistant software
    • (1986)
    • Aucsmith, D.1
  • 4
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • C. Collberg C. Thomborson D. Low A taxonomy of obfuscating transformations July 1997 148 Department of Computer Science, University of Auckland http://www.cs.auckland. ac.nz/~collberg/Research/Publications/ CollbergThomborsonLow97a/index.html
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 5
    • 79953682092 scopus 로고    scopus 로고
    • Manufacturing cheap, resilient, and stealthy opaque constructs
    • CA
    • C. Collberg C. Thomborson D. Low Manufacturing cheap, resilient, and stealthy opaque constructs SIGPLAN-SIGACT POPL'98 SIGPLAN-SIGACT POPL'98 San Diego CA 1998-January http://www.cs.auckland. ac.nz/~collberg/Research/Publications/ CollbergThomborsonLow98a/index.html
    • (1998)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 6
    • 85176695286 scopus 로고    scopus 로고
    • University of Washington
    • J. Dean Whole-Program Optimization of Object-Oriented Languages 1996 University of Washington
    • (1996)
    • Dean, J.1
  • 7
    • 33746067793 scopus 로고
    • Software protection: Myth or reality?
    • J. R. Gosler Software protection: Myth or reality? CRYPTO'85 — Advances in Cryptology 140 157 CRYPTO'85 — Advances in Cryptology 1985-August
    • (1985) , pp. 140-157
    • Gosler, J.R.1
  • 8
    • 0003518498 scopus 로고    scopus 로고
    • The Java Language Specification
    • Addison-Wesley
    • J. Gosling B. Joy G. Steele The Java Language Specification 1996 Addison-Wesley
    • (1996)
    • Gosling, J.1    Joy, B.2    Steele, G.3
  • 9
    • 84976759457 scopus 로고
    • A complexity measure based on nesting level
    • W. A. Harrison K. I. Magel A complexity measure based on nesting level SIGPLAN Notices 16 3 63 74 1981
    • (1981) SIGPLAN Notices , vol.16 , Issue.3 , pp. 63-74
    • Harrison, W.A.1    Magel, K.I.2
  • 10
    • 0019613747 scopus 로고
    • Software structure metrics based on information flow
    • S. Henry D. Kafura Software structure metrics based on information flow IEEE Transactions on Software Engineering 7 5 510 518 September 1981
    • (1981) IEEE Transactions on Software Engineering , vol.7 , Issue.5 , pp. 510-518
    • Henry, S.1    Kafura, D.2
  • 12
    • 85176686917 scopus 로고
    • Apple's QuickTime lawsuit May-June 1995 http://www. macworld.com/pages/june.95/News.848.html and may.95/News.705.html
    • (1995)
  • 15
    • 0027334778 scopus 로고
    • Creating abstract superclasses by refactoring
    • W. F. Opdyke R. E. Johnson Creating abstract superclasses by refactoring Proceedings of the 21st Annual Conference on Computer Science 66 73 Proceedings of the 21st Annual Conference on Computer Science New York USA 1993-February
    • (1993) , pp. 66-73
    • Opdyke, W.F.1    Johnson, R.E.2
  • 16
    • 85176667622 scopus 로고    scopus 로고
    • Optimizing ANSI C with superoperators
    • T. Proebsting Optimizing ANSI C with superoperators POPL'96 POPL'96 1996-January
    • (1996)
    • Proebsting, T.1
  • 17
    • 0025238177 scopus 로고
    • Reverse-engineering someone else's software: Is it legal?
    • P. Samuelson Reverse-engineering someone else's software: Is it legal? IEEE Software 90 96 January 1990
    • (1990) IEEE Software , pp. 90-96
    • Samuelson, P.1
  • 18
    • 0001532436 scopus 로고    scopus 로고
    • On the notion of inheritance
    • A. Taivalsaari On the notion of inheritance ACM Computing Surveys 28 3 438 479 September 1996
    • (1996) ACM Computing Surveys , vol.28 , Issue.3 , pp. 438-479
    • Taivalsaari, A.1
  • 19
    • 85176670684 scopus 로고    scopus 로고
    • R. Tolksdorf Programming languages for the Java virtual machine 1997 http://grunge.cs.tu-berlin. de/~tolk/vmlanguages.html
    • (1997)
    • Tolksdorf, R.1
  • 20
    • 85176679847 scopus 로고    scopus 로고
    • H. P. Van Vliet Crema — The Java obfuscator January 1996 http: //web.inter.nl.net/users/H.P.van.Vliet
    • (1996)
    • Van Vliet, H.P.1
  • 21
    • 85176677481 scopus 로고    scopus 로고
    • U. G. Wilhelm Cryptographically protected objects 1997 http://lsewww.epfl.ch/~wilhelm/CryPO. html
    • (1997)
    • Wilhelm, U.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.