共 50 条
- [1] Compiling method for obfuscation technology based on crossing control-flow Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2010, 44 (05): : 903 - 909
- [2] Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1756 - 1763
- [3] Program obfuscation scheme using random numbers to complicate control flow EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 916 - 925
- [5] A Parameterized Flattening Control Flow Based Obfuscation Algorithm with Opaque Predicate for Reduplicate Obfuscation PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 372 - 378
- [8] Deep Control Flow Obfuscation Model Based on Callback Function Ruan Jian Xue Bao/Journal of Software, 2022, 33 (05): : 1833 - 1848
- [9] Technique of Source Code Obfuscation Based on Data Flow and Control FLow Tansformations PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1093 - 1097