-
1
-
-
61849095111
-
Program obfuscation: A quantitative approach
-
New York, NY, USA, ACM
-
B. Anckaert, M. Madou, B. D. Sutter, B. D. Bus, K. D. Bosschere, and B. Preneel. Program obfuscation: a quantitative approach. In QoP '07: Proceedings of the 2007 ACM workshop on Quality of protection, pages 15-20, New York, NY, USA, 2007. ACM.
-
(2007)
QoP '07: Proceedings of the 2007 ACM workshop on Quality of protection
, pp. 15-20
-
-
Anckaert, B.1
Madou, M.2
Sutter, B.D.3
Bus, B.D.4
Bosschere, K.D.5
Preneel, B.6
-
2
-
-
79251578513
-
On the (im) possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im) possibility of obfuscating programs. Lecture Notes in Computer Science, 2139:19-23, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 19-23
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
4
-
-
0004046658
-
A taxonomy of obduscating transformations
-
Technical Report 148, Dept. of Computer Science, The Univ. of Auckland
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obduscating transformations. Technical Report 148, Dept. of Computer Science, The Univ. of Auckland, 1997.
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
5
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
New York, NY, USA, ACM
-
C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In POPL '98: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 184-196, New York, NY, USA, 1998. ACM.
-
(1998)
POPL '98: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
8
-
-
84944220914
-
An approach to the objective and quantitative evaluation of tamper-resistant software
-
Springer
-
H. Goto, M. Mambo, K. Matsumura, and H. Shizuya. An approach to the objective and quantitative evaluation of tamper-resistant software. In Third International Workshop on Information Security (ISW2000), pages 82-96. Springer, 2000.
-
(2000)
Third International Workshop on Information Security (ISW2000)
, pp. 82-96
-
-
Goto, H.1
Mambo, M.2
Matsumura, K.3
Shizuya, H.4
-
9
-
-
35048879839
-
The obfuscation executive
-
Proceedings of the 7th International Conference on Information Security, ISC'04, of
-
K. Heffner and C. Collberg. The obfuscation executive. In Proceedings of the 7th International Conference on Information Security, ISC'04, volume 3255 of LNCS, pages 428-440, 2004.
-
(2004)
LNCS
, vol.3255
, pp. 428-440
-
-
Heffner, K.1
Collberg, C.2
-
11
-
-
85033285200
-
Experimental design and analysis in software engineering
-
and
-
S. L. Pfleeger. Experimental design and analysis in software engineering. SIGSOFT NOTES, Parts 1 to 5, 1994 and 1995.
-
(1994)
SIGSOFT NOTES, Parts 1 to 5
-
-
Pfleeger, S.L.1
-
13
-
-
33646948907
-
An empirical examination of the reverse engineering process for binary files
-
I. Sutherland, G. E. Kalb, A. Blyth, and G. Mulley. An empirical examination of the reverse engineering process for binary files. Computers & Security, 25(3):221-228, 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.3
, pp. 221-228
-
-
Sutherland, I.1
Kalb, G.E.2
Blyth, A.3
Mulley, G.4
-
14
-
-
0344990740
-
Method for renaming identifiers of a computer program
-
US patent 6,102,966
-
P. Tyma. Method for renaming identifiers of a computer program. US patent 6,102,966, 2000.
-
(2000)
-
-
Tyma, P.1
-
16
-
-
0003639957
-
-
Kluwer Academic Publishers
-
C. Wohlin, P. Runeson, M. Höst, M. Ohlsson, B. Regnell, and A. Wesslén. Experimentation in Software Engineering - An Introduction. Kluwer Academic Publishers, 2000.
-
(2000)
Experimentation in Software Engineering - An Introduction
-
-
Wohlin, C.1
Runeson, P.2
Höst, M.3
Ohlsson, M.4
Regnell, B.5
Wesslén, A.6
|