-
2
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. Lecture Notes in Computer Science, 2139:1-, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 1
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
3
-
-
0025400314
-
An empirical study of the use of the goto statement
-
B. A. Benander, N. Gorla, and A. C. Benander. An empirical study of the use of the goto statement. J. Syst. Softw., 11(3):217-223, 1990.
-
(1990)
J. Syst. Softw
, vol.11
, Issue.3
, pp. 217-223
-
-
Benander, B.A.1
Gorla, N.2
Benander, A.C.3
-
4
-
-
0028446078
-
A metrics suite for object oriented design
-
S. R. Chidamber and C. F. Kemerer. A metrics suite for object oriented design. IEEE Trans. Softw. Eng., 20(6):476-493, 1994.
-
(1994)
IEEE Trans. Softw. Eng
, vol.20
, Issue.6
, pp. 476-493
-
-
Chidamber, S.R.1
Kemerer, C.F.2
-
5
-
-
0027684663
-
Operating system protection through program evolution
-
F. B. Cohen. Operating system protection through program evolution. Comput. Secur., 12(6):565-584, 1993.
-
(1993)
Comput. Secur
, vol.12
, Issue.6
, pp. 565-584
-
-
Cohen, F.B.1
-
6
-
-
0031620963
-
Breaking abstractions and unstructuring data structures
-
Washington, DC, USA, IEEE Computer Society
-
C. Collberg, C. Thomborson, and D. Low. Breaking abstractions and unstructuring data structures. In ICCL '98: Proceedings of the 1998 International Conference on Computer Languages, page 28, Washington, DC, USA, 1998. IEEE Computer Society.
-
(1998)
ICCL '98: Proceedings of the 1998 International Conference on Computer Languages
, pp. 28
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
7
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation - tools for software protection
-
Aug
-
C. S. Collberg and C. Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. In IEEE Transactions on Software Engineering, volume 28, pages 735-746, Aug. 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, pp. 735-746
-
-
Collberg, C.S.1
Thomborson, C.2
-
13
-
-
84959039621
-
Decompiling Java bytecode: Problems, traps and pit-falls
-
R. N. Horspool, editor, Compiler Construction, of, Springer Verlag
-
J. Miecnikowski and L. J. Hendren. Decompiling Java bytecode: problems, traps and pit-falls. In R. N. Horspool, editor, Compiler Construction, volume 2304 of Lecture Notes in Computer Science, pages 111-127. Springer Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2304
, pp. 111-127
-
-
Miecnikowski, J.1
Hendren, L.J.2
-
15
-
-
84860073015
-
-
Available on
-
Mocha, the Java Decompiler. Available on: http://www.brouhaha.com/~eric/ computers/mocha.html.
-
Mocha, the Java Decompiler
-
-
-
16
-
-
0027554366
-
Measurement of data structure complexity
-
J. C. Munson and T. M. Khoshgoftaar. Measurement of data structure complexity. J. Syst. Softw., 20(3):217-225, 1993.
-
(1993)
J. Syst. Softw
, vol.20
, Issue.3
, pp. 217-225
-
-
Munson, J.C.1
Khoshgoftaar, T.M.2
-
18
-
-
35248814855
-
Java obfuscation with a theoretical basis for building secure mobile agents
-
Y. Sakabe, M. Soshi, and A. Miyaji. Java obfuscation with a theoretical basis for building secure mobile agents. In Communications and Multimedia Security, pages 89-103, 2003.
-
(2003)
Communications and Multimedia Security
, pp. 89-103
-
-
Sakabe, Y.1
Soshi, M.2
Miyaji, A.3
-
19
-
-
18844377176
-
Obfuscation of design intent in object-oriented applications
-
New York, NY, USA, ACM Press
-
M. Sosonkin, G. Naumovich, and N. Memon. Obfuscation of design intent in object-oriented applications. In DRM '03: Proceedings of the 3rd ACM workshop on Digital rights management, pages 142-153, New York, NY, USA, 2003. ACM Press.
-
(2003)
DRM '03: Proceedings of the 3rd ACM workshop on Digital rights management
, pp. 142-153
-
-
Sosonkin, M.1
Naumovich, G.2
Memon, N.3
-
20
-
-
37149049202
-
-
Source Again, A Java Decompiler. Available on
-
Source Again - A Java Decompiler. Available on: http://www.ahpah.com/.
-
-
-
-
21
-
-
0001956132
-
Soot - a Java optimization framework
-
R. Vallée-Rai, L. Hendren, V. Sundaresan, P. Lam, E. Gagnon, and P. Co. Soot - a Java optimization framework. In Proceedings of CASCON 1999, pages 125-135, 1999.
-
(1999)
Proceedings of CASCON 1999
, pp. 125-135
-
-
Vallée-Rai, R.1
Hendren, L.2
Sundaresan, V.3
Lam, P.4
Gagnon, E.5
Co, P.6
|