Acknowledgement
"본 연구는 과학기술정보통신부 및 정보통신기획평가원의 융합보안핵심인재양성사업의 연구 결과로 수행되었음" (IITP-2024-RS-2023-00266615*)
References
- 항공안전기술원, 국내외 드론 산업 현황 조사https://www.droneportal.or.kr/subList/20000000028
- Gaurav Kumar, "A Survey on Program Code Obfuscation Technique," Engineering and Technology Journal, vol. 1, no. 2, 2016.
- B. Cyr, J. Mahmod and U. Guin, "Low-Cost and Secure Firmware Obfuscation Method for Protecting Electronic Systems From Cloning," in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 3700-3711, April 2019. https://doi.org/10.1109/JIOT.2018.2890277
- Nagra, Jasvir, and Christian Collberg. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software rotection. Pearson Education, 2009.