1 |
Proguard. http://proguard.sourceforge.net/
|
2 |
Android developers SDK. http://developer.android. com/sdk/
|
3 |
C. Collberg and J. Nagra. "Surreptitious Software: Obfuscation, Watermarking, and Tamper proofing for Software Protection," Addison Wesley Professional, 2009.
|
4 |
Stringer. h ttps: / /ifxstore. com/ stringer /
|
5 |
Allatori. http://www.allatori.com
|
6 |
Zelix Klassmaster. http://www.zelix .com/ klassmaster /index. html
|
7 |
PreEmptive dotfuscator. http://www.preemptive. com/products/dotfuscator/
|
8 |
Red Gate's .NET obfuscator. http://www.red-gate. com/ products/ dotnet- development/ smartassembly /
|
9 |
Crypto Obfuscator. http://www.ssware .com/ cryptoobfuscator / obfuscator-net. htm
|
10 |
Enck W., Octeau D., McDaniel P., and Chaudhuri S., "A study of android application security," USENIX security symposium, 2011.
|
11 |
Collberg C, Thomborson C., and Low D., "A taxonomy of obfuscating transformation," Technical report 148, Department of computer science, the University of Auckland, Auckland, New Zealand, 1997.
|
12 |
Deepsea obfuscator. http://www. deepseaobfuscator. com
|