共 50 条
- [41] A Method and Implementation of Control Flow Obfuscation Using SEH 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 336 - 339
- [43] Exploring compiler optimization space for control flow obfuscation Computers and Security, 2024, 139
- [45] Parameterized decomposition tree-based obfuscation method with double flattening control flow Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2015, 43 (05): : 132 - 138
- [46] Software Protection on the Go: A Large-Scale Empirical Study on Mobile App Obfuscation PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 26 - 36
- [47] Forensic and Software (UN) Obfuscation PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 416 - 430
- [49] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security Cybersecurity, 3
- [50] Methods and Software for the Program Obfuscation SIBCON-2009: INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS, 2009, : 113 - 115