1. Arini Balakrishnan and Chloe Schulze . 2005. Code obfuscation literature survey. CS701 Construction of compilers , Vol. 19 ( 2005 ). Arini Balakrishnan and Chloe Schulze. 2005. Code obfuscation literature survey. CS701 Construction of compilers, Vol. 19 (2005).
2. Different Obfuscation Techniques for Code Protection
3. MineThrottle: Defending against Wasm In-Browser Cryptojacking
4. Christian Collberg , Sam Martin , Jonathan Myers , Bill Zimmerman , Petr Krajca , Gabriel Kerneis , Saumya Debray , and Babak Yadegari . 2022. The Tigress Obfuscator. https://tigress.wtf. [Online ; accessed 4- April - 2022 ]. Christian Collberg, Sam Martin, Jonathan Myers, Bill Zimmerman, Petr Krajca, Gabriel Kerneis, Saumya Debray, and Babak Yadegari. 2022. The Tigress Obfuscator. https://tigress.wtf. [Online; accessed 4-April-2022].
5. Monero Documentation. 2013. CryptoNight. https://monerodocs.org/proof-of-work/cryptonight/. accessed: 2022-02-12. Monero Documentation. 2013. CryptoNight. https://monerodocs.org/proof-of-work/cryptonight/. accessed: 2022-02-12.