메뉴 건너뛰기




Volumn , Issue , 2008, Pages 39-45

Towards experimental evaluation of code obfuscation techniques

Author keywords

Empirical studies; Software obfuscation

Indexed keywords

CODES (SYMBOLS); REVERSE ENGINEERING;

EID: 70349263325     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456362.1456371     Document Type: Conference Paper
Times cited : (30)

References (16)
  • 4
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obduscating transformations
    • Technical Report 148, Dept. of Computer Science, The Univ. of Auckland
    • C. Collberg, C. Thomborson, and D. Low. A taxonomy of obduscating transformations. Technical Report 148, Dept. of Computer Science, The Univ. of Auckland, 1997.
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 9
    • 35048879839 scopus 로고    scopus 로고
    • The obfuscation executive
    • Proceedings of the 7th International Conference on Information Security, ISC'04, of
    • K. Heffner and C. Collberg. The obfuscation executive. In Proceedings of the 7th International Conference on Information Security, ISC'04, volume 3255 of LNCS, pages 428-440, 2004.
    • (2004) LNCS , vol.3255 , pp. 428-440
    • Heffner, K.1    Collberg, C.2
  • 11
    • 85033285200 scopus 로고
    • Experimental design and analysis in software engineering
    • and
    • S. L. Pfleeger. Experimental design and analysis in software engineering. SIGSOFT NOTES, Parts 1 to 5, 1994 and 1995.
    • (1994) SIGSOFT NOTES, Parts 1 to 5
    • Pfleeger, S.L.1
  • 13
    • 33646948907 scopus 로고    scopus 로고
    • An empirical examination of the reverse engineering process for binary files
    • I. Sutherland, G. E. Kalb, A. Blyth, and G. Mulley. An empirical examination of the reverse engineering process for binary files. Computers & Security, 25(3):221-228, 2006.
    • (2006) Computers & Security , vol.25 , Issue.3 , pp. 221-228
    • Sutherland, I.1    Kalb, G.E.2    Blyth, A.3    Mulley, G.4
  • 14
    • 0344990740 scopus 로고    scopus 로고
    • Method for renaming identifiers of a computer program
    • US patent 6,102,966
    • P. Tyma. Method for renaming identifiers of a computer program. US patent 6,102,966, 2000.
    • (2000)
    • Tyma, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.