Browse > Article

모바일 난독화 기술 동향  

Yuxue, Piao (숭실대학교)
Jeong, Jin-Hyeok (숭실대학교)
Lee, Jeong-Hyeon (숭실대학교)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Proguard. http://proguard.sourceforge.net/
2 Android developers SDK. http://developer.android. com/sdk/
3 C. Collberg and J. Nagra. "Surreptitious Software: Obfuscation, Watermarking, and Tamper proofing for Software Protection," Addison Wesley Professional, 2009.
4 Stringer. h ttps: / /ifxstore. com/ stringer /
5 Allatori. http://www.allatori.com
6 Zelix Klassmaster. http://www.zelix .com/ klassmaster /index. html
7 PreEmptive dotfuscator. http://www.preemptive. com/products/dotfuscator/
8 Red Gate's .NET obfuscator. http://www.red-gate. com/ products/ dotnet- development/ smartassembly /
9 Crypto Obfuscator. http://www.ssware .com/ cryptoobfuscator / obfuscator-net. htm
10 Enck W., Octeau D., McDaniel P., and Chaudhuri S., "A study of android application security," USENIX security symposium, 2011.
11 Collberg C, Thomborson C., and Low D., "A taxonomy of obfuscating transformation," Technical report 148, Department of computer science, the University of Auckland, Auckland, New Zealand, 1997.
12 Deepsea obfuscator. http://www. deepseaobfuscator. com