共 50 条
- [31] Parameterized decomposition tree-based obfuscation method with double flattening control flow Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2015, 43 (05): : 132 - 138
- [33] Research on Code Obfuscation Based on Maze Protection Technology MECHATRONICS, ROBOTICS AND AUTOMATION, PTS 1-3, 2013, 373-375 : 1691 - +
- [34] Research on deformation based binary code obfuscation technology Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (01): : 14 - 21
- [36] RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation 23RD INTERNATIONAL CONFERENCE ON VLSI DESIGN, 2010, : 405 - 410
- [37] Three control flow obfuscation methods for Java']Java software IEE PROCEEDINGS-SOFTWARE, 2006, 153 (02): : 80 - 86
- [38] θ-Rand: Random Noise-based Location Obfuscation Based on Circle Sectors 2013 IEEE SYMPOSIUM ON INDUSTRIAL ELECTRONICS & APPLICATIONS (ISIEA 2013), 2013, : 100 - 104
- [39] A method of data obfuscation based on Monte Carlo random Monotone function 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 752 - 755
- [40] Obfuscation Techniques Based on Random Strings Used in Malicious VBA Scripts 2022 24TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING, SYNASC, 2022, : 347 - 352