共 50 条
- [22] Technique of Source Code Obfuscation Based on Data Flow and Control FLow Tansformations PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1093 - 1097
- [23] RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation 23RD INTERNATIONAL CONFERENCE ON VLSI DESIGN, 2010, : 405 - 410
- [25] Deep Control Flow Obfuscation Model Based on Callback Function Ruan Jian Xue Bao/Journal of Software, 2022, 33 (05): : 1833 - 1848
- [26] Three control flow obfuscation methods for Java']Java software IEE PROCEEDINGS-SOFTWARE, 2006, 153 (02): : 80 - 86
- [27] An Obfuscation Method to Build a Fake Call Flow Graph by Hooking Method Calls 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 331 - 336
- [28] Android Control Flow Obfuscation Based on Dynamic Entry Points Modification 2019 22ND INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2019, : 296 - 303
- [29] Hidden Path: Dynamic Software Watermarking Based on Control flow Obfuscation 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 443 - 450
- [30] Technique of Java']Javascript Code Obfuscation Based on Control Flow Tansformations COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 391 - 394