[1] FELMETSGER V, CAVEDON L, KRUEGEL C, et al. Toward automated detection of logic vulnerabilities in Web applications [C]// Proceedings of the 19th USENIX Security Symposium. Berkeley: USENIX Association, 2010: 143-160. [2] XU W, ZHANG F, ZHU S. JStill: mostly static detection of obfuscated malicious JavaScript code [C]// Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. New York: ACM, 2013: 117-128. [3] XU W, ZHANG F, ZHU S. The power of obfuscation techniques in malicious JavaScript code: a measurement study [C]// Proceedings of the 7th International Conference on Malicious and Unwanted Software. Piscataway: IEEE, 2012:9-16. [4] COHEN F B. Operating system protection through program evolution [J]. Computers & Security, 1993, 12(6): 565-584. [5] CHEN P-Y, KATARIA G, KRISHNAN R. Software diversity for information security [EB/OL]. [2014-06-06]. http://infosecon.net/workshop/pdf/47.pdf. [6] XIN Z. Study on program diversity for software security [D]. Nanjing: Nanjing University, 2013.(辛知.程序多样性技术研究[D].南京:南京大学,2013.) [7] COLLBERG C, NAGRA J. Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection [M]. Boston: Addison-Wesley, 2009: 203-209. [8] COLLBERG C, MARTIN S, MYERS J, et al. Distributed application tamper detection via continuous software updates [C]// Proceedings of the 28th Annual Computer Security Applications Conference. New York: ACM, 2012: 319-328. [9] BERTHOLON B, VARRETTE S, BOUVRY P. JShadObf: a JavaScript obfuscator based on multi-objective optimization algorithms [M]. Berlin: Springer, 2013: 336-349. [10] COLLBERG C. The case for dynamic digital asset protection techniques [EB/OL]. [2014-06-15]. http://www.irdeto-prod.com/documents/AC_Dynamic_vs_Static_Security_Prof_Collberg.pdf. [11] COLLBERG C, DAVIDSON J W, GIACOBAZZI R, et al. Toward digital asset protection [J]. IEEE Intelligent Systems, 2011, 26(6): 8-13. [12] ANCKAERT. Diversity for software protection [D]. Ghent:Ghent University, 2008. [13] O'DONNELL A J, SETHU H. Software diversity as a defense against viral propagation: models and simulations [C]// Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation. Washington, DC: IEEE Computer Society, 2005: 247-253. [14] COLLBERG C, THOMBORSON C, LOW D. A taxonomy of obfuscating transformations [R]. Auckland: University of Auckland, 1997. |