Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Modeling and Simulation,Information Systems,Signal Processing,Theoretical Computer Science,Control and Systems Engineering
Reference22 articles.
1. Wang, C., Davidson, J., Hill, J., & Knight, J. (2001). Protection of software-based survivability mechanisms. In Proc. international conference of dependable systems and networks.
2. Wang, C. (2000). A security architecture for survivability mechanisms. Ph.D. thesis, Department of Computer Science, University of Virginia.
3. Anckaert, B., Madou, M., De Sutter, B., De Bus, B., De Bosschere, K., & Preneel, B. (2007). Program obfuscation: A quantitative approach. In Proceedings of the 2007 ACM workshop on quality of protection (pp. 15–20). New York: ACM.
4. Majumdar, A., & Thomborson, C. (2006). Interpreting opacity in the context of information-hiding and obfuscation in distributed systems. In 2006 IEEE region 10 conference TENCON 2006 (pp. 1–4).
5. Borselius, N. (2002). Mobile agent security. Electronics and Communication Engineering Journal, 14(5), 211–218.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. DeView: Confining Progressive Web Applications by Debloating Web APIs;Proceedings of the 38th Annual Computer Security Applications Conference;2022-12-05
2. Obfuscation Algorithms Based on Congruence Equation and Knapsack Problem;Advances in Internet, Data and Web Technologies;2019
3. Diversification and obfuscation techniques for software security: A systematic literature review;Information and Software Technology;2018-12
4. Mobile Agents System Security;ACM Computing Surveys;2018-09-30
5. Self-Modifying Code;International Journal of Secure Software Engineering;2017-07