共 50 条
- [22] Protection against Code Obfuscation Attacks based on control dependencies in Android Systems 2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 149 - 157
- [23] Mode-based Obfuscation using Control-Flow Modifications PROCEEDINGS OF THE THIRD WORKSHOP ON CRYPTOGRAPHY AND SECURITY IN COMPUTING SYSTEMS (CS2 2016), 2016, : 19 - 24
- [24] Compiling method for obfuscation technology based on crossing control-flow Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2010, 44 (05): : 903 - 909
- [25] Android Control Flow Obfuscation Based on Dynamic Entry Points Modification 2019 22ND INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2019, : 296 - 303
- [26] Technique of Java']Javascript Code Obfuscation Based on Control Flow Tansformations COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 391 - 394
- [28] Code Obfuscation Technique for Enhancing Software Protection Against Reverse Engineering ADVANCES IN ARTIFICIAL SYSTEMS FOR MEDICINE AND EDUCATION II, 2020, 902 : 571 - 580
- [29] Eternal War in Software Security: A Survey of Control Flow Protection PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 716 - 725
- [30] Progressive Control Flow Obfuscation for Android Applications PROCEEDINGS OF TENCON 2018 - 2018 IEEE REGION 10 CONFERENCE, 2018, : 1075 - 1079