메뉴 건너뛰기




Volumn 3, Issue 1, 2007, Pages 3-21

On the possibility of practically obfuscating programs towards a unified perspective of code protection

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; AUTOMATION; COMPUTATIONAL METHODS; COMPUTER SOFTWARE; COMPUTER VIRUSES; INTELLIGENT SYSTEMS;

EID: 33947609379     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-006-0029-6     Document Type: Article
Times cited : (45)

References (15)
  • 1
    • 33947599948 scopus 로고    scopus 로고
    • GOST 281.47-89. Cryptographic protection for data processing systems, 1980. White paper, available from http://www.cisco.com/warp/public/732/netflow
    • GOST 281.47-89. Cryptographic protection for data processing systems, 1980. White paper, available from http://www.cisco.com/warp/public/732/netflow
  • 3
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Technical Report 148, Department of Computer Science, University of Auckland, July
    • Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 4
    • 33746882722 scopus 로고    scopus 로고
    • Strong cryptography armoured computer viruses forbidding code analysis: The BRADLEY virus
    • Broucek, V, ed, May
    • Filiol, E.: Strong cryptography armoured computer viruses forbidding code analysis: the BRADLEY virus. In: Broucek, V. (ed.) Proceedings of the 14th EICAR Conference, pp. 201-217, May 2005
    • (2005) Proceedings of the 14th EICAR Conference , pp. 201-217
    • Filiol, E.1
  • 5
    • 33947589470 scopus 로고    scopus 로고
    • Filiol, E.: Techniques virales avancées. Springer, France (2006). An English translation is pending and will be in print at the beginning of 2007
    • Filiol, E.: Techniques virales avancées. Springer, France (2006). An English translation is pending and will be in print at the beginning of 2007
  • 7
    • 0000236696 scopus 로고
    • On notation for ordinal numbers
    • Kleene, S.C.: On notation for ordinal numbers. J. Symbolic Logic 3(4), 150-155 (1938)
    • (1938) J. Symbolic Logic , vol.3 , Issue.4 , pp. 150-155
    • Kleene, S.C.1
  • 8
    • 0041619709 scopus 로고    scopus 로고
    • Lenstra, A.K.: Integer factoring. Des. Codes Cryptograp. 19, 101-128 (2000)
    • Lenstra, A.K.: Integer factoring. Des. Codes Cryptograp. 19, 101-128 (2000)
  • 9
    • 84862747854 scopus 로고    scopus 로고
    • Thirty years of integer factorization
    • Chyzak F, ed, April 2002
    • Morain, F.: Thirty years of integer factorization. In: Chyzak F. (ed.) Proceedings of the Algorithms Seminar 2000-2001, p. 77-80, April 2002
    • (2000) Proceedings of the Algorithms Seminar , pp. 77-80
    • Morain, F.1
  • 10
    • 0023985474 scopus 로고
    • The notion of security for probabilistic cryptosystems
    • Micali, S., Rackoff, C., Sloan, B.: The notion of security for probabilistic cryptosystems. SIAM J. Comput. 17, 412-426 (1988)
    • (1988) SIAM J. Comput , vol.17 , pp. 412-426
    • Micali, S.1    Rackoff, C.2    Sloan, B.3
  • 13
    • 85027100501 scopus 로고
    • The quadratic sieve factoring algorithm
    • Beth, T, Cot, N, Ingemarsson, I, eds, Advances in Cryptology, Eurocrypt'84, Springer Berlin Heidelberg, Newyork
    • Pomerance, C.: The quadratic sieve factoring algorithm. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) Advances in Cryptology - Eurocrypt'84, LNCS vol. 209, pp. 169-182. Springer Berlin Heidelberg, Newyork (1984)
    • (1984) LNCS , vol.209 , pp. 169-182
    • Pomerance, C.1
  • 14
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J., 28, 656-715 (1949)
    • (1949) Bell Syst. Tech. J , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 15
    • 23844438042 scopus 로고    scopus 로고
    • On the time complexity of computer viruses
    • Zuo, Z., Zhou, M.: On the time complexity of computer viruses. IEEE Trans. Informat. Theory 51(8), 2962-2966 (2005)
    • (2005) IEEE Trans. Informat. Theory , vol.51 , Issue.8 , pp. 2962-2966
    • Zuo, Z.1    Zhou, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.