Author:
Feng Weimiao,Hu Rui,Zhou Cong,Yu Lei
Publisher
Springer Nature Switzerland
Reference17 articles.
1. Wang, C., Davidson, J., Hill, J., Knight, J.: Protection of software-based survivability mechanisms. In: 2001 International Conference on Dependable Systems and Networks, pp. 193-202 (2001). https://doi.org/10.1109/DSN.2001.9
2. Simplify. https://github.com/CalebFenton/simplify. Accessed 11 Apr 2022
3. Shu, J., Li, J., Zhang, Y., Gu, D.: Android app protection via interpretation obfuscation. In: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, pp. 63-68 (2014). https://doi.org/10.1109/DASC.2014.20
4. Eagle, C.: The IDA Pro Book. No Starch Press, San Francisco (2011)
5. Tang, Z., Chen, X., Fang, D., Chen, F.: Research on java software protection with the obfuscation in identifier renaming. In: 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC), pp. 1067-1071 (2009)