-
1
-
-
0004072686
-
-
Addison-Wesley, Reading, MA
-
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading, MA, 1988.
-
(1988)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
3
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Proceedings of Advances in Cryptology, 21st Annual International Cryptology Conference (CRYPTO 2001), volume 2139, pages 1-18, 2001.
-
(2001)
Proceedings of Advances in Cryptology, 21st Annual International Cryptology Conference (CRYPTO 2001)
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
7
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
San Diego, CA, Jan.
-
C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Principles of Programming Languages 1998, POPL'98, San Diego, CA, Jan. 1998.
-
(1998)
Principles of Programming Languages 1998, POPL'98
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
8
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation - Tools for software protection
-
Aug.
-
C. S. Collberg and C. Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering, 28(8):735-746, Aug. 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.S.1
Thomborson, C.2
-
10
-
-
0004189634
-
-
Addison-Wesley Publishing Company, Inc., Reading, Massachusetts, ISBN 0-201-63361-2
-
E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns. Addison-Wesley Publishing Company, Inc., Reading, Massachusetts, 1994. ISBN 0-201-63361-2.
-
(1994)
Design Patterns
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
12
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. A. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. C. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 168-177, 2000.
-
(2000)
Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.A.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.C.6
Horowitz, M.7
-
14
-
-
79952154321
-
A framework for optimizing Java using attributes
-
P. Pominville, F. Qian, R. Vallee-Rai, L. Hendren, and C. Verbrugge. A framework for optimizing Java using attributes. In Proceedings of CASCON 2000, pages 152-168, 2000.
-
(2000)
Proceedings of CASCON 2000
, pp. 152-168
-
-
Pominville, P.1
Qian, F.2
Vallee-Rai, R.3
Hendren, L.4
Verbrugge, C.5
-
17
-
-
0033203879
-
Practical experience with an application extractor for Java
-
F. Tip, C. Laffra, P. F. Sweeney, and D. Streeter. Practical experience with an application extractor for Java. ACM SIGPLAN Notices, 34(10):292-305, 1999.
-
(1999)
ACM SIGPLAN Notices
, vol.34
, Issue.10
, pp. 292-305
-
-
Tip, F.1
Laffra, C.2
Sweeney, P.F.3
Streeter, D.4
|