1. Balachandran, V., Emmanuel, S.: Software code obfuscation by hiding control flow information in stack. In: 2011 IEEE International Workshop on Information Forensics and Security, pp. 1–6. IEEE (2011)
2. Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations (1997)
3. Collberg, C., Thomborson, C., Low, D.: Breaking abstractions and unstructuring data structures. In: Proceedings of the 1998 International Conference on Computer Languages (Cat. No. 98CB36225), pp. 28–38. IEEE (1998)
4. Dolan, S.: MOV is Turing-complete. Cl. Cam. Ac. Uk, pp. 1–4 (2013)
5. Lecture Notes in Computer Science;Z Lin,2009