1 |
B. M. Cho, J. W. Nho, H. S. Oh, "Implement and test data obfuscation tool for language," KIISE Proceedings, pp. 292-294, 2006.
|
2 |
J. H. Lee, "Data structures reverse engineering techniques for the executable file fragmentation," Journal of Information Security and Cryptology, vol. 22. no. 3, pp. 615-619, Jun. 2012.
|
3 |
Korea Copyright Commission, "SW reverse analysis and technical protection," Korea Copyright Commission, 2009.
|
4 |
S. H. Oh, "Study on the compatibility of the virtual machine for the reverse engineering," Journal of Korea Society of Automotive Engineers, vol. 22. no. 6, pp.31-38, Sep. 2014.
|
5 |
D. S. Ha, K. H. Lee, H. K. Oh, "Anti-reverse engineering techniques for Android applications," Reviews of KIISC, Journal of Security Engineering Research Institute, vol. 25. no. 3, pp. 19-28, Jun. 2015.
|
6 |
J. H. Kim, "Robust anti-reverse engineering techniques for using the AES algorithm to protect Android applications," Journal of Information Science, vol. 42. no. 12, pp. 1611-1622, Dec. 2015.
|
7 |
K. H. Kang, "Static Code Analysis with Open Source based tool chain," Journal of Information Science, vol. 21. no. 2, pp. 148-153, Feb. 2015.
DOI
|
8 |
S. J. Cho, "Software copyright protection technology trends," Korea Society of Information Technology, vol. 11. no. 2, pp. 23-32, Dec. 2013.
|
9 |
Piao, Yuxue Jung, Jin-Hyuk Yi, Jeong Hyun , "Structural and Functional Analyses of ProGuard Obfuscation Tool," Journal of Korea Institute of Communication Sciences, vol. 38. no. 8, pp. 654-662, Aug. 2013.
|
10 |
C. S. Chun, "Dynamic analysis of executable obfuscation techniques to virtualization," Journal of Information Science, vol. 40. no. 1, pp. 61-71, Jan. 2013.
|
11 |
S. H. Lee, "The original structure and meaning extraction method of dynamic virtual machines running file-based obfuscation," Journal of Information Science, vol. 41 no. 10, pp. 859-869, Oct. 2014.
|
12 |
S. K. Jung, "protection method of applications and licenses through the executable file encryption portion," Journal of Information Science Proceedings, vol. 39. no. 2C, pp. 157-159, Nov. 2012.
|