-
1
-
-
0004072686
-
-
Addison-Wesley
-
A.V. Aho, R. Sethi, and J.D. Ullman, Compilers: Principles, Techniques and Tools, Addison-Wesley, 1986.
-
(1986)
Compilers: Principles, Techniques and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
2
-
-
0003502085
-
-
Computer Systems Laboratory
-
G. Aigner, A. Diwan, D.L. Heine, M.S. Lam, D.L. Moore, B.R. Murphy, and C. Sapuntzakis, An overview of the SUIF2 compiler infrastructure, Computer Systems Laboratory, Stanford University, http://suif.stanford.edu/.
-
An Overview of the SUIF2 Compiler Infrastructure
-
-
Aigner, G.1
Diwan, A.2
Heine, D.L.3
Lam, M.S.4
Moore, D.L.5
Murphy, B.R.6
Sapuntzakis, C.7
-
3
-
-
84955621400
-
Tamper resistant software: An implementation
-
R.J. Anderson ed., Information Hiding: First International Workshop, Springer-Verlag
-
D. Aucsmith, "Tamper resistant software: An implementation," in R.J. Anderson ed., Information Hiding: First International Workshop, Lecture Notes in Computer Science, vol. 1174, pp.317-333, Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1174
, pp. 317-333
-
-
Aucsmith, D.1
-
4
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Department of Computer Science, the University of Auckland, Auckland, New Zealand
-
C. Collberg, C. Thomborson, and D. Low, A taxonomy of obfuscating transformations, Technical Report 148, Department of Computer Science, the University of Auckland, Auckland, New Zealand, 1997.
-
(1997)
Technical Report
, vol.148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
6
-
-
0000998787
-
Interprocedural pointer alias analysis
-
M. Hind, M. Burke, P. Carini, and J.-D. Choi, "Interprocedural pointer alias analysis," ACM Trans. Prog. Lang. Syst., vol.21, no.4, pp.848-894, 1999.
-
(1999)
ACM Trans. Prog. Lang. Syst.
, vol.21
, Issue.4
, pp. 848-894
-
-
Hind, M.1
Burke, M.2
Carini, P.3
Choi, J.-D.4
-
7
-
-
0001943763
-
Time limited Blackbox security: Protecting mobile agents from malicious hosts
-
G. Vigna ed., Mobile Agents Security, Springer-Verlag
-
F. Hohl, "Time limited Blackbox security: Protecting mobile agents from malicious hosts," in G. Vigna ed., Mobile Agents Security, Lecture Notes in Computer Science, vol.1419, pp.92-113, Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
8
-
-
0041863080
-
A proposal for tamper-resistant mobile agents
-
Oct.
-
T. Iwai, K. Kuriyama, W. Wu, and F. Mizoguchi, "A proposal for tamper-resistant mobile agents," Computer Security Symposium (CSS99), pp.43-48, Oct. 1999.
-
(1999)
Computer Security Symposium (CSS99)
, pp. 43-48
-
-
Iwai, T.1
Kuriyama, K.2
Wu, W.3
Mizoguchi, F.4
-
9
-
-
0003590145
-
-
PhD thesis, Rutgers University, New Brunswick, NJ, Jan.
-
W.A. Landi, Interprocedural aliasing in the presence of pointers, PhD thesis, Rutgers University, New Brunswick, NJ, Jan. 1992.
-
(1992)
Interprocedural Aliasing in the Presence of Pointers
-
-
Landi, W.A.1
-
10
-
-
84958760367
-
A tentative approach to constructing tamper-resistant software
-
Sept.
-
M. Mambo, T. Murayama, and E. Okamoto, "A tentative approach to constructing tamper-resistant software," New Security Paradigm Workshop, pp.23-33, Sept. 1997.
-
(1997)
New Security Paradigm Workshop
, pp. 23-33
-
-
Mambo, M.1
Murayama, T.2
Okamoto, E.3
-
11
-
-
0025548384
-
Properties of data flow frameworks: A unified model
-
T.J. Marlowe and B.G. Ryder, "Properties of data flow frameworks: A unified model," Acta Inf., vol.28, no.2, pp.121-163, 1990.
-
(1990)
Acta Inf.
, vol.28
, Issue.2
, pp. 121-163
-
-
Marlowe, T.J.1
Ryder, B.G.2
-
12
-
-
0041863078
-
Evaluation of obfuscator by searching runtime data
-
Jan.
-
M. Misawa, K. Akai, and T. Matsumoto, "Evaluation of obfuscator by searching runtime data," Symposium on Cryptography and Information Security (SCIS 2002), pp.365-370, Jan. 2002.
-
(2002)
Symposium on Cryptography and Information Security (SCIS 2002)
, pp. 365-370
-
-
Misawa, M.1
Akai, K.2
Matsumoto, T.3
-
13
-
-
4243775814
-
On the complexity of function pointer may-alias analysis
-
Department of Computer Science, University of Arizona, Oct.
-
R. Muth and S. Debray, On the complexity of function pointer may-alias analysis, Technical Report TR96-18, Department of Computer Science, University of Arizona, Oct. 1996.
-
(1996)
Technical Report
, vol.TR96-18
-
-
Muth, R.1
Debray, S.2
-
15
-
-
0028510908
-
The undecidability of aliasing
-
Nov.
-
G. Ramalingam, "The undecidability of aliasing," ACM Trans. Prog. Lang. Syst., vol.16, no.6, pp.1467-1471, Nov. 1994.
-
(1994)
ACM Trans. Prog. Lang. Syst.
, vol.16
, Issue.6
, pp. 1467-1471
-
-
Ramalingam, G.1
-
16
-
-
0012037951
-
Software tamper resistance: Obstructing static analysis of programs
-
Department of Computer Science, University of Virginia, Dec.
-
C. Wang, J. Hill, J. Knight, and J. Davidson, "Software tamper resistance: Obstructing static analysis of programs," Technical Report CS-2000-12, Department of Computer Science, University of Virginia, Dec. 2000.
-
(2000)
Technical Report
, vol.CS-2000-12
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
-
17
-
-
26844544709
-
On the problem of trust in mobile agent systems
-
Internet Society, March
-
U.G. Wilhelm, S. Staamann, and L. Buttyán, On the problem of trust in mobile agent systems, Symposium on Network and Distributed System Security, Internet Society, March 1998.
-
(1998)
Symposium on Network and Distributed System Security
-
-
Wilhelm, U.G.1
Staamann, S.2
Buttyán, L.3
-
18
-
-
84957032408
-
Complexity of single level function pointer aliasing analysis
-
Laboratory of Computer Science Research, Rutgers University, Oct.
-
S. Zhang and B. Ryder, Complexity of single level function pointer aliasing analysis, Technical Report LCSR-TR-233, Laboratory of Computer Science Research, Rutgers University, Oct. 1994.
-
(1994)
Technical Report
, vol.LCSR-TR-233
-
-
Zhang, S.1
Ryder, B.2
|