1. Memory Analysis of the Dalvik (Android) Virtual Machine;Case,2011
2. Advanced obfuscation techniques for Java bytecode;Chan;J. Syst. Softw.,2004
3. On instrumenting obfuscated Java bytecode with aspects;Chen,2006
4. Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., Rosenblum, M. (2004). Understanding data lifetime via whole system simulation. In: Proceedings of the 13th Conference on USENIX Security Symposium – Volume 13 SSYM’04. URL: http://dl.acm.org/citation.cfm?id=1251375.1251397.
5. Chow, J., Pfaff, B., Garfinkel, T., Rosenblum, M. (2005). Shredding your garbage: reducing data lifetime through secure deallocation. In: Proceedings of the 14th Conference on USENIX Security Symposium – Volume 14 SSYM’05. URL: http://dl.acm.org/citation.cfm?id=1251398.1251420.