1. Arboit, G.: A method for watermarking Java programs via opaque predicates. In: Proceedings of the Fifth International Conference on Electronic Commerce Research (ICECR 2002), pp. 102–110 (2002)
2. Balachandran, V., Emmanuel, S.: Potent and stealthy control flow obfuscation by stack based self-modifying code. IEEE Trans. Inf. Forensics Secur. 8(4), 669–681 (2013)
3. Cadar, C., Dunbar, D., Engler, D.R., et al.: KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI 2008), pp. 209–224 (2008)
4. Chailloux, E., Manoury, P., Pagano, B.: Developing Applications with Objective Caml. O’Reilly France, Paris (2002)
5. Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 1998), pp. 184–196 (1998)