Subject
Signal Processing,Control and Systems Engineering,Software
Reference30 articles.
1. Collberg, C. and Tomborson, C., Watermarking, tamper-proofing, and obfuscation—Tools for software production, IEEE Trans. Software Eng., 2002, vol. 28, no. 8, pp. 735–746. https://doi.org/10.1109/TSE.2002.1027797
2. Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., and Waters, B., Candidate indistinguishability obfuscation and functional encryption for all circuits, SIAM J. Comput., 2016, vol. 45, no. 3, pp. 882–929. https://doi.org/10.1137/14095772X
3. Xu, H., Zhou, Y., Ming, J., and Lyu, M., Layered obfuscation: a taxonomy of software obfuscation techniques for layered security, Cybersecurity, 2020, vol. 3, p. 9. https://doi.org/10.1186/s42400-020-00049-3
4. Collberg, C., Thomborson, C., and Low, D., A taxonomy of obfuscating transformations, Tech. Report, Department of Computer Science, Univ. of Auckland, 1997, no. 148.
5. Kanzaki, Y., Monden, A., and Collberg, C., Code artificiality: A metric for the code stealth based on an N-gram model, IEEE/ACM 1st Int. Workshop on Software Protection, Florence, 2015, IEEE, 2015, pp. 31–37. https://doi.org/10.1109/SPRO.2015.14
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Method to Quantitative Compare Obfuscating Ttransformations;Informatics and Automation;2024-05-28
2. Smart Contract Reentrancy Vulnerability Detection Based on CNN and LSTM-Attention;2024 5th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT);2024-03-29