1 |
Allatori, Java obfuscator, Retrieved May., 2013, from http://www.allatori.com.
|
2 |
Saikoa, DexGuard, Retrieved May., 2013, from http://www.saikoa.com/.
|
3 |
Wikipedia, Visitor Pattern, Retrieved May., 2013, from http://en.wikipedia.org/wiki/Visitor_pattern.
|
4 |
Java Decompiler, Retrieved May., 2013, from http://java.decompiler.free.fr/.
|
5 |
J. H. Jung, J. Y. Kim, H. C. Lee, and J. H. Yi, "Repackaging attack on android banking applications and its countermeasures," J. Wireless Personal Communications(WPC)., [Online], Available: http://link.springer.com/content/pdf/10.1007%2 Fs11277-013-1258-x.pdf, June. 2013.
|
6 |
G. I. Ma, H. C. Lee, and J. H. Yi, "A secure short-range wireless connectivity scheme for mobile wallet services," J. KIISE : Inform. Networking, vol. 38, no. 5, pp. 394-404, Oct. 2011.
과학기술학회마을
|
7 |
C. Collberg, C. Thomborson, and D. Low, "A taxonomy of obfuscating transformations," Technical Report No. 148, Univ. Auckland, New Zealand, 1997.
|
8 |
Eric Lafortune, ProGuard, Retrieved May., 2013, from http://proguard.sourceforge.net/.
|
9 |
T. Lindholm, F. Yellin, G. Bracha, and A. Buckley, "The Java virtual machine specification: Java SE 7 Edition," Oracle America, Feb. 2013.
|
10 |
PreEmptive Solutions, DashOPro, Retrieved May., 2013, from http://www.preemptive.com.
|