-
1
-
-
61849095111
-
Program obfuscation: A quantitative approach
-
New York, NY, USA, ACM
-
B. Anckaert, M. Madou, B. D. Sutter, B. D. Bus, K. D. Bosschere, and B. Preneel. Program obfuscation: a quantitative approach. In QoP '07: Proc. of the 2007 ACM Workshop on Quality of protection, pages 15-20, New York, NY, USA, 2007. ACM.
-
(2007)
QoP '07: Proc. of the 2007 ACM Workshop on Quality of protection
, pp. 15-20
-
-
Anckaert, B.1
Madou, M.2
Sutter, B.D.3
Bus, B.D.4
Bosschere, K.D.5
Preneel, B.6
-
2
-
-
79251578513
-
On the (im) possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im) possibility of obfuscating programs. Lecture Notes in Computer Science, 2139:19-23, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 19-23
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
3
-
-
70349263325
-
Towards experimental evaluation of code obfuscation techniques
-
ACM, Oct
-
M. Ceccato, M. Di Penta, J. Nagra, P. Falcarin, F. Ricca, M. Torchiano, and P. Tonella. Towards experimental evaluation of code obfuscation techniques. In Proc. of the 4th Workshop on Quality of Protection, pages 39-46. ACM, Oct 2008.
-
(2008)
Proc. of the 4th Workshop on Quality of Protection
, pp. 39-46
-
-
Ceccato, M.1
Di Penta, M.2
Nagra, J.3
Falcarin, P.4
Ricca, F.5
Torchiano, M.6
Tonella, P.7
-
4
-
-
70349982229
-
The effectiveness of source code obfuscation: An experimental assessment
-
Technical report, University of Sannio, Jan
-
M. Ceccato, M. Di Penta, J. Nagra, P. Falcarin, F. Ricca, M. Torchiano, and P. Tonella. The effectiveness of source code obfuscation: an experimental assessment. Technical report, University of Sannio - http://www.rcost. unisannio.it/mdipenta/icpc09-tr.pdf, Jan 2009.
-
(2009)
-
-
Ceccato, M.1
Di Penta, M.2
Nagra, J.3
Falcarin, P.4
Ricca, F.5
Torchiano, M.6
Tonella, P.7
-
6
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Technical Report 148, Dept. of Computer Science, The Univ. of Auckland
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Dept. of Computer Science, The Univ. of Auckland, 1997.
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
7
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation - tools for software protection
-
C. Collberg, C. Thomborson, and D. Low. Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering, 28, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
8
-
-
84944220914
-
An approach to the objective and quantitative evaluation of tamper-resistant software
-
Springer
-
H. Goto, M. Mambo, K. Matsumura, and H. Shizuya. An approach to the objective and quantitative evaluation of tamper-resistant software. In Third Int. Workshop on Information Security (ISW2000), pages 82-96. Springer, 2000.
-
(2000)
Third Int. Workshop on Information Security (ISW2000)
, pp. 82-96
-
-
Goto, H.1
Mambo, M.2
Matsumura, K.3
Shizuya, H.4
-
11
-
-
33646948907
-
An empirical examination of the reverse engineering process for binary files
-
I. Sutherland, G. E. Kalb, A. Blyth, and G. Mulley. An empirical examination of the reverse engineering process for binary files. Computers & Security, 25(3):221-228, 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.3
, pp. 221-228
-
-
Sutherland, I.1
Kalb, G.E.2
Blyth, A.3
Mulley, G.4
-
13
-
-
0003639957
-
-
Kluwer Academic Publishers
-
C. Wohlin, P. Runeson, M. Höst, M. Ohlsson, B. Regnell, and A. Wesslén. Experimentation in Software Engineering - An Introduction. Kluwer Academic Publishers, 2000.
-
(2000)
Experimentation in Software Engineering - An Introduction
-
-
Wohlin, C.1
Runeson, P.2
Höst, M.3
Ohlsson, M.4
Regnell, B.5
Wesslén, A.6
|