Author:
Chow Stanley,Gu Yuan,Johnson Harold,Zakharov Vladimir A.
Publisher
Springer Berlin Heidelberg
Reference22 articles.
1. Brickell E.F., Davenport D.M. On the classification of ideal secret sharing schemes. J. Cryptology, 4, 1991, p.123–134.
2. Chow S., Johnson H., and Gu Y., Tamper resistant software — control flow encoding. Filed under the Patent Coöperation Treaty on August 18, 2000, under Serial No. PCT/CA00/00943.
3. Collberg C., Thomborson C., Low D., A taxonomy of obfuscating transformations, Tech. Report, N 148, Dept. of Computer Science, Univ. of Auckland, 1997.
4. Collberg C., Thomborson C., Low D., Manufacturing cheap, resilient and stealthy opaque constructs, Symp. on Principles of Prog. Lang., 1998, p.184–196.
5. Collberg C., Thomborson C., Low D. Breaking abstraction and unstructuring data structures, in IEEE Int. Conf. on Computer Languages, 1998, p.28–38.
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. BiAn: Smart Contract Source Code Obfuscation;IEEE Transactions on Software Engineering;2023-09-01
2. OCFI: Make Function Entry Identification Hard Again;Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis;2023-07-12
3. ROPfuscator: Robust Obfuscation with ROP;2023 IEEE Security and Privacy Workshops (SPW);2023-05
4. Protecting Behavioral IPs During Design Time: Key-Based Obfuscation Techniques for HLS in the Cloud;Behavioral Synthesis for Hardware Security;2021-05-28
5. The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes;Journal of Computer Virology and Hacking Techniques;2021-05-17