1 |
P C VAN OORSCHOT. Revisiting software protection [C]// Proceedings of the 2003 International Conference on Information Security, LNCS 2851. Berlin: Springer, 2003: 1-13.
|
2 |
王朝坤,付军宁,王建民,等.软件防篡改技术综述[J].计算机研究与发展, 2011, 48(6): 923-933.
|
|
WANG C K, FU J N, WANG J M, et al. Survey of software tamper proofing technique[J]. Journal of Computer Research and Development, 2011, 48(6): 923-933.
|
3 |
RAJBA P, MAZURCZYK W. Data hiding using code obfuscation [C]// Proceedings of the 16th International Conference on Availability, Reliability and Security. New York: ACM, 2021: No.75. 10.1145/3465481.3470086
|
4 |
LIU Z W, ZHANG Z, LIU H, et al. Web service active defense mechanism based on automated software diversity [C]// Proceedings of the 2020 International Conference on Computer Engineering and Application. Piscataway: IEEE, 2020: 241-249. 10.1109/iccea50009.2020.00060
|
5 |
SHAMLAN M H BIN, ALAIDAROOS A S, MERDHAH M H BIN, et al. Experimental evaluation of the obfuscation techniques against reverse engineering[M]// SAEED F, AL-HADHRAMI T, MOHAMMED F, et al. Advances on Smart and Soft Computing, AISC 1188. Singapore: Springer, 2021: 383-390.
|
6 |
SCHRITTWIESER S, KATZENBEISSER S, KINDER J, et al. Protecting software through obfuscation: can it keep pace with progress in code analysis?[J]. ACM Computing Surveys, 2017, 49(1): No.4.
|
7 |
BARAK B, GOLDREICH O, IMPAGLIAZZO R, et al. On the (im) possibility of obfuscating programs[J]. Journal of the ACM, 2012, 59(2): No.6. 10.1145/2160158.2160159
|
8 |
COLLBERG C, THOMBORSON C, LOW D. A taxonomy of obfuscating transformations: technical report #148[R]. Auckland: The University of Auckland, 1997.
|
9 |
CANFORA G, DI PENTA M, CERULO L. Achievements and challenges in software reverse engineering[J]. Communications of the ACM, 2011, 54(4): 142-151. 10.1145/1924421.1924451
|
10 |
LATTNER C. The LLVM compiler infrastructure[EB/OL]. [2021-07-01]. .
|
11 |
LATTNER C. What source languages are supported?[EB/OL]. [2021-07-01]. . 10.1007/11532378_2
|
12 |
杨宇波.代码混淆模型研究[D].北京:北京邮电大学, 2015: 19-46.
|
|
YANG Y B. Research on code obfuscation model[D]. Beijing: Beijing University of Posts and Telecommunications, 2015: 19-46
|
13 |
COHEN F B. Operating system protection through program evolution[J]. Computers and Security, 1993, 12(6): 565-584. 10.1016/0167-4048(93)90054-9
|
14 |
COLLBERG C, THOMBORSON C, LOW D. Manufacturing cheap, resilient, and stealthy opaque constructs [C]// Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York: ACM, 1998: 184-196. 10.1145/268946.268962
|
15 |
COLLBERG C, THOMBORSON C, LOW D. Breaking abstractions and unstructuring data structures [C]// Proceedings of the 1998 International Conference on Computer Language. Piscataway: IEEE, 1998: 28-38. 10.1145/268946.268962
|
16 |
CHOW S, EISEN P, JOHNSON H, et al. White-box cryptography and an AES implementation [C]// Proceedings of the 2002 International Workshop on Selected Areas in Cryptography, LNCS 2595. Berlin: Springer, 2003: 250-270.
|
17 |
LINN C, DEBRAY S. Obfuscation of executable code to improve resistance to static disassembly [C]// Proceedings of the 10th ACM Conference on Computer and Communications Security. New York: ACM, 2003: 290-299. 10.1145/948109.948149
|
18 |
ROUNDY K A, MILLER B P. Binary-code obfuscations in prevalent packer tools[J]. ACM Computing Surveys, 2013, 46(1): No.4. 10.1145/2522968.2522972
|
19 |
MAJUMDAR A, DRAPE S, THOMBORSON C. Slicing obfuscations: design, correctness, and evaluation [C]// Proceedings of the 2007 ACM Workshop on Digital Rights Management. New York: ACM, 2007: 70-81. 10.1145/1314276.1314290
|
20 |
JUNOD P, RINALDINI J, WEHRLI J, et al. Obfuscator-LLVM — software protection for the masses [C]// Proceedings of 2015 IEEE/ACM 1st International Workshop on Software Protection. Piscataway: IEEE, 2015: 3-9. 10.1109/spro.2015.10
|
21 |
GARG S, GENTRY C, HALEVI S, et al. Candidate indistinguishability obfuscation and functional encryption for all circuit [C]// Proceedings of the IEEE 54th Annual Symposium on Foundations of Computer Science. Piscataway: IEEE, 2013: 40-49. 10.1109/focs.2013.13
|
22 |
ANCKAERT B, MADOU M, DE SUTTER B, et al. Program obfuscation: a quantitative approach [C]// Proceedings of the 2007 ACM Workshop on Quality of Protection. New York: ACM, 2007: 15-20. 10.1145/1314257.1314263
|
23 |
ISOBE Y, TAMADA H. Design and evaluation of the de-obfuscation method against the identifier renaming methods[J]. International Journal of Networked and Distributed Computing, 2018, 6(4): 232-238. 10.2991/ijndc.2018.4.6.6
|
24 |
霍建雷.用于Java软件保护的代码混淆技术研究与实现[D].西安:西北大学, 2009: 24-48.
|
|
HUO J L. Research and implementation of code obfuscation techniques in Java software protection[D]. Xi’an: Northwest University, 2009: 24-48
|
25 |
CECCATO M, DI PENTAM, NAGRA J, et al. The effectiveness of source code obfuscation: an experimental assessment [C]// Proceedings of the IEEE 17th International Conference on Program Comprehension. Piscataway: IEEE, 2009: 178-187. 10.1109/icpc.2009.5090041
|
26 |
AL-HAKIMI A M H, SULTAN A B M, ABDUL GHANI A A, et al. Hybrid obfuscation technique to protect source code from prohibited software reverse engineering[J]. IEEE Access, 2020, 8: 187326-187342. 10.1109/access.2020.3028428
|
27 |
CIMATO S, DE SANTIS A, FERRARO PETRILLO U. Overcoming the obfuscation of Java programs by identifier renaming[J]. Journal of Systems and Software, 2005, 78(1): 60-72. 10.1016/j.jss.2004.11.019
|
28 |
RACORDON D. From ASTs to machine code with LLVM [C]// Companion Proceedings of the 5th International Conference on the Art, Science, and Engineering of Programming. New York: ACM, 2021: 68-76. 10.1145/3464432.3464777
|
29 |
LATTNER C. LLVM language reference manual[EB/OL]. [2021-07-01]. .
|
30 |
潘雁.基于虚拟机框架的代码混淆技术研究[D].郑州:战略支援部队信息工程大学, 2018: 11-24.
|
|
PAN Y. Research on code obfuscation based on virtual machine-based code protection[D]. Zhengzhou: Information Engineering University, 2018: 11-24
|
31 |
JAFFE A, LACOMIS J, SCHWARTZ E J, et al. Meaningful variable names for decompiled code: a machine translation approach [C]// Proceedings of the ACM/IEEE 26th Conference on Program Comprehension. New York: ACM, 2018: 20-30. 10.1145/3196321.3196330
|
32 |
KASHIWABARA Y, ONIZUKA Y, ISHIO T, et al. Recommending verbs for rename method using association rule mining [C]// Proceedings of 2014 Software Evolution Week-IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering. Piscataway: IEEE, 2014: 323-327. 10.1109/csmr-wcre.2014.6747186
|
33 |
LI G J, LIU H, NYAMAWE A S. A survey on renamings of software entities[J]. ACM Computing Surveys, 2020, 53(2): No.41. 10.1145/3379443
|
34 |
KUMAR R, VAISHAKH A R E. Detection of obfuscation in Java malware[J]. Procedia Computer Science, 2016, 78: 521-529. 10.1016/j.procs.2016.02.097
|
35 |
张越.基于代码混淆的软件保护方案研究与设计[D].成都:电子科技大学, 2019: 61-71.
|
|
ZHANG Y. Research and design of a software protection scheme based on code obfuscation[D]. Chengdu: University of Electronic Science and Technology of China, 2019: 61-71
|
36 |
LACOMIS J, YIN P C, SCHWARTZ E, et al. DIRE: a neural approach to decompiled identifier naming [C]// Proceedings of 34th IEEE/ACM International Conference on Automated Software Engineering. Piscataway: IEEE, 2019: 628-639. 10.1109/ase.2019.00064
|