Author:
Balachandran Vivek,Sufatrio ,Tan Darell J.J.,Thing Vrizlynn L.L.
Funder
Singapore National Research Foundation
Subject
Law,General Computer Science
Reference32 articles.
1. Potent and stealthy control flow obfuscation by stack based self-modifying code;Balachandran;IEEE Trans Inf Forensic Secur,2013
2. On the (im)possibility of obfuscating programs;Barak;J ACM,2012
3. Obfuscating Java: The most pain for the least gain;Batchelder,2007
4. Software protection with code mobility, in: Proc. 2nd ACM Workshop on Moving Target Defense (MTD ‘15);Cabutto,2015
5. Advanced obfuscation techniques for Java bytecode;Chan;J Syst Softw,2004
Cited by
46 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献