1. (1) A. Monden and C. Thomborson: “Recent Software Protection Techniques—Software-only Tamper Prevention—”, IPSJ magazine, Vol. 46, No. 4, pp. 431-437 (2005) (in Japanese)
2. (2) C. Collberg, C. Thomborson, and D. Low: “A Taxonomy of Obfuscating Transformations”, Department of Computer Science, The University of Auckland, Technical Report No. 148 (1997)
3. (3) T. László and Á. Kiss: “Obfuscating C++ Programs via Control Flow Flattening”, Annales Universitatis Scientiarum Budapestinensis de Rolando Etvs Nominatae. Sectio Computatorica, Vol. 30, pp. 3-19, Hungary (2009)
4. (4) P. Junod, J. Rinaldini, J. Wehrli, and J. Michielin: “Obfuscator-LLVM-Software Protection for the Masses”, Proc. International Workshop on Software Protection (SPRO 2015), pp. 3-9 (2015)
5. (5) D. Forte, S. Bhunia, M. M. Tehranipoor (Eds. ): Hardware Protection through Obfuscation, Springer International Publishing (2017)