-
1
-
-
61849095111
-
Program obfuscation: A quantitative approach
-
ACM New York, NY, USA 10.1145/1314257.1314263
-
Anckaert B, Madou M, Sutter BD, Bus BD, Bosschere KD, Preneel B (2007) Program obfuscation: a quantitative approach. In: QoP '07: Proc. of the 2007 ACM workshop on quality of protection. ACM, New York, NY, USA, pp 15-20. doi: 10.1145/1314257.1314263
-
(2007)
QoP '07: Proc. of the 2007 ACM Workshop on Quality of Protection
, pp. 15-20
-
-
Anckaert, B.1
Madou, M.2
Sutter, B.D.3
Bus, B.D.4
Bosschere, K.D.5
Preneel, B.6
-
2
-
-
84897992747
-
Modern permutation test software
-
Edgington E (ed). Marcel Decker
-
Baker RD (1995) Modern permutation test software. In: Edgington E (ed) Randomization tests. Marcel Decker
-
(1995)
Randomization Tests
-
-
Baker, R.D.1
-
3
-
-
70349977389
-
The effectiveness of source code obfuscation: An experimental assessment
-
doi: 10.1109/ICPC.2009.5090041
-
Ceccato M, Di Penta M, Nagra J, Falcarin P, Ricca F, Torchiano M, Tonella P (2009a) The effectiveness of source code obfuscation: an experimental assessment. In: IEEE 17th international conference on program comprehension (ICPC), pp 178-187. doi: 10.1109/ICPC.2009.5090041
-
(2009)
IEEE 17th International Conference on Program Comprehension (ICPC)
, pp. 178-187
-
-
Ceccato, M.1
Di Penta, M.2
Nagra, J.3
Falcarin, P.4
Ricca, F.5
Torchiano, M.6
Tonella, P.7
-
4
-
-
70349982229
-
-
Tech. rep., University of Sannio
-
Ceccato M, Di Penta M, Nagra J, Falcarin P, Ricca F, Torchiano M, Tonella P (2009b) The effectiveness of source code obfuscation: an experimental assessment. Tech. rep., University of Sannio. URL http://www.rcost.unisannio.it/ mdipenta/icpc09-tr.pdf
-
(2009)
The Effectiveness of Source Code Obfuscation: An Experimental Assessment
-
-
Ceccato, M.1
Di Penta, M.2
Nagra, J.3
Falcarin, P.4
Ricca, F.5
Torchiano, M.6
Tonella, P.7
-
5
-
-
47749090850
-
Barrier slicing for remote software trusting
-
IEEE Computer Society. (Sept. 30 2007-Oct. 1 2007). doi: 10.1109/SCAM.2007.4362895
-
Ceccato M, Preda MD, Nagra J, Collberg C, Tonella P (2007) Barrier slicing for remote software trusting. In: Proc. of the 7th IEEE international working conference on source code analysis and manipulation (SCAM 2007). IEEE Computer Society, pp 27-36. (Sept. 30 2007-Oct. 1 2007). doi: 10.1109/SCAM.2007.4362895
-
(2007)
Proc. of the 7th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)
, pp. 27-36
-
-
Ceccato, M.1
Preda, M.D.2
Nagra, J.3
Collberg, C.4
Tonella, P.5
-
10
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
ACM New York, NY, USA 10.1145/268946.268962
-
Collberg C, Thomborson C, Low D (1998) Manufacturing cheap, resilient, and stealthy opaque constructs. In: POPL '98: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on principles of programming languages. ACM, New York, NY, USA, pp 184-196. doi: 10.1145/268946.268962
-
(1998)
POPL '98: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
11
-
-
33646831658
-
The TXL source transformation language
-
10.1016/j.scico.2006.04.002 1102.68434 2242125
-
Cordy J (2006) The TXL source transformation language. Sci Comput Program 61(3):190-210
-
(2006)
Sci Comput Program
, vol.61
, Issue.3
, pp. 190-210
-
-
Cordy, J.1
-
14
-
-
79952182106
-
Guest editors' introduction: Software protection
-
10.1109/MS.2011.34
-
Falcarin P, Collberg C, Atallah M, Jakubowski M (2011) Guest editors' introduction: software protection. IEEE Softw 28(2):24-27
-
(2011)
IEEE Softw
, vol.28
, Issue.2
, pp. 24-27
-
-
Falcarin, P.1
Collberg, C.2
Atallah, M.3
Jakubowski, M.4
-
16
-
-
0032761428
-
Points-to analysis for program understanding
-
10.1016/S0164-1212(98)10058-4
-
Fiutem R, Tonella P, Antoniol G, Merlo E (1999) Points-to analysis for program understanding. J Syst Softw 44(3):213-227
-
(1999)
J Syst Softw
, vol.44
, Issue.3
, pp. 213-227
-
-
Fiutem, R.1
Tonella, P.2
Antoniol, G.3
Merlo, E.4
-
25
-
-
76749090561
-
How developers' experience and ability influence web application comprehension tasks supported by UML stereotypes: A series of four experiments
-
10.1109/TSE.2009.69 10.1109/TSE.2009.69
-
Ricca F, Di Penta M, Torchiano M, Tonella P, Ceccato M (2010) How developers' experience and ability influence web application comprehension tasks supported by UML stereotypes: a series of four experiments. IEEE Trans Softw Eng 36:96-118. doi: 10.1109/TSE.2009.69
-
(2010)
IEEE Trans Softw Eng
, vol.36
, pp. 96-118
-
-
Ricca, F.1
Di Penta, M.2
Torchiano, M.3
Tonella, P.4
Ceccato, M.5
-
26
-
-
56749160500
-
Are fit tables really talking?: A series of experiments to understand whether fit tables are useful during evolution tasks
-
Ricca F, Di Penta M, Torchiano M, Tonella P, Ceccato M, Visaggio CA (2008) Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks. In: 30th International Conference on Software Engineering (ICSE 2008), pp 361-370
-
(2008)
30th International Conference on Software Engineering (ICSE 2008)
, pp. 361-370
-
-
Ricca, F.1
Di Penta, M.2
Torchiano, M.3
Tonella, P.4
Ceccato, M.5
Visaggio, C.A.6
-
27
-
-
56349142435
-
Using acceptance tests as a support for clarifying requirements: A series of experiments
-
10.1016/j.infsof.2008.01.007
-
Ricca F, Torchiano M, Di Penta M, Ceccato M, Tonella P (2009) Using acceptance tests as a support for clarifying requirements: a series of experiments. Inf Softw Technol 51:270-283
-
(2009)
Inf Softw Technol
, vol.51
, pp. 270-283
-
-
Ricca, F.1
Torchiano, M.2
Di Penta, M.3
Ceccato, M.4
Tonella, P.5
-
28
-
-
49049113110
-
Application-oriented trust in distributed computing
-
IEEE
-
Scandariato R, Ofek Y, Falcarin P, Baldi M (2008) Application-oriented trust in distributed computing. In: 3rd international conference on availability, reliability and security, ARES 08. IEEE, pp 434-439
-
(2008)
3rd International Conference on Availability, Reliability and Security, ARES 08
, pp. 434-439
-
-
Scandariato, R.1
Ofek, Y.2
Falcarin, P.3
Baldi, M.4
-
30
-
-
33646948907
-
An empirical examination of the reverse engineering process for binary files
-
10.1016/j.cose.2005.11.002
-
Sutherland I, Kalb GE, Blyth A, Mulley G (2006) An empirical examination of the reverse engineering process for binary files. Comput Secur 25(3):221-228
-
(2006)
Comput Secur
, vol.25
, Issue.3
, pp. 221-228
-
-
Sutherland, I.1
Kalb, G.E.2
Blyth, A.3
Mulley, G.4
-
31
-
-
0344990740
-
Method for renaming identifiers of a computer program
-
US Patent 6,102,966
-
Tyma P (2000) Method for renaming identifiers of a computer program. US Patent 6,102,966
-
(2000)
-
-
Tyma, P.1
-
33
-
-
0003639957
-
-
Kluwer Academic Publishers
-
Wohlin C, Runeson P, Höst M, Ohlsson M, Regnell B, Wesslén A (2000) Experimentation in software engineering - an introduction. Kluwer Academic Publishers
-
(2000)
Experimentation in Software Engineering - An Introduction
-
-
Wohlin, C.1
Runeson, P.2
Höst, M.3
Ohlsson, M.4
Regnell, B.5
Wesslén, A.6
|