-
1
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
Collberg, C., Thomborson, C., and Low, D.: Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. In Proceedings of 1998 ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'98). 1998.
-
(1998)
Proceedings of 1998 ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'98)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
2
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
Vigna G., ed.: Mobile Agents and Security. Springer-Verlag
-
Sander, T., and Tschudin, C.F.: Protecting mobile agents against malicious hosts. In Vigna G., ed.: Mobile Agents and Security. Volume 1419 of Lecture Notes in Computer Science. Springer-Verlag. 1998
-
(1998)
Lecture Notes in Computer Science
, vol.1419
-
-
Sander, T.1
Tschudin, C.F.2
-
3
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
Vigna G., ed.: Mobile Agents and Security. Springer-Verlag
-
Hohl, F.: Time limited blackbox security: Protecting mobile agents from malicious hosts. In Vigna G., ed.: Mobile Agents and Security. Volume 1419 of Lecture Notes in Computer Science. Springer-Verlag. 1998
-
(1998)
Lecture Notes in Computer Science
, vol.1419
-
-
Hohl, F.1
-
4
-
-
35248814855
-
Java obfuscation with a theoretical basis for building secure mobile agents
-
Lioy A., Mazzocchi D. eds.: Communications and Multimedia Security (CMS 2003). Springer-Verlag
-
Sakabe, Y., Masakazu, S., and Miyaji, A.: Java obfuscation with a theoretical basis for building secure mobile agents:. In Lioy A., Mazzocchi D. eds.: Communications and Multimedia Security (CMS 2003). Volume 2828 of Lecture Notes in Computer Science. Springer-Verlag. 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2828
-
-
Sakabe, Y.1
Masakazu, S.2
Miyaji, A.3
-
5
-
-
0035789216
-
Protection of software-based survivability mechanisms
-
IEEE Computer Society
-
Wang, C., Hill, J., Knight, J.C., and Davidson, J.W.: Protection of software-based survivability mechanisms. In Proceedings of the 2001 conference on Dependable Systems and Networks. IEEE Computer Society. 2001.
-
(2001)
Proceedings of the 2001 Conference on Dependable Systems and Networks
-
-
Wang, C.1
Hill, J.2
Knight, J.C.3
Davidson, J.W.4
-
7
-
-
0000998787
-
Interprocedural pointer alias analysis
-
Hind, M., Burke, M., Carini, P., and Choi, J.D.: Interprocedural pointer alias analysis. ACM Transactions on Programming Languages and Systems (TOPLAS), Vol. 21 No. 4, 1999.
-
(1999)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.21
, Issue.4
-
-
Hind, M.1
Burke, M.2
Carini, P.3
Choi, J.D.4
-
10
-
-
0033203864
-
Compositional pointer and escape analysis for Java programs
-
Denver, CO, USA
-
Whaley, J. and Rinard, M.: Compositional pointer and escape analysis for Java programs. Proceedings of the 1999 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages & Applications (OOPSLA '99), Denver, CO, USA. 1999.
-
(1999)
Proceedings of the 1999 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages & Applications (OOPSLA '99)
-
-
Whaley, J.1
Rinard, M.2
|