共 50 条
- [21] Compiling method for obfuscation technology based on crossing control-flow Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2010, 44 (05): : 903 - 909
- [22] Android Control Flow Obfuscation Based on Dynamic Entry Points Modification 2019 22ND INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2019, : 296 - 303
- [23] Control Flow Obfuscation via CPS Transformation PROCEEDINGS OF THE 2019 ACM SIGPLAN WORKSHOP ON PARTIAL EVALUATION AND PROGRAM MANIPULATION (PEPM '19), 2019, : 54 - 60
- [24] CFHider: Control Flow Obfuscation with Intel SGX IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, : 541 - 549
- [25] Hidden Path: Dynamic Software Watermarking Based on Control flow Obfuscation 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 443 - 450
- [26] Embedded Software Security through Key-Based Control Flow Obfuscation SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 30 - +
- [28] Control Flow Obfuscation Scheme for LLVM Intermediate Languages Computer Engineering and Applications, 2023, 59 (08): : 263 - 269
- [29] A Method and Implementation of Control Flow Obfuscation Using SEH 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 336 - 339
- [30] Control flow driven splitting of loop nests at the source code level EMBEDDED SOFTWARE FOR SOC, 2003, : 215 - 229