1 |
Ping Wang, Seok-kyu Kang, Kwangjo Kim, "Tamper Resistant Software Through Dynamic Integrity Checking", Proc. 2005 Symposium on Cryptography and Information Security, 2005
|
2 |
Cullen Linn, Saumya Debray, "Obfuscation of Executable Code to Improve Resistance to Static Disassembly", Proc. 10th ACM Conference on Computer and Communications Security, pp. 290-299, October 2003
|
3 |
Sonali Gupta, "Code Obfuscation Part 2: Obfuscating Data Structures", http://palisade.plynt.com, September 2005
|
4 |
Hoi Chang, Mikhail J. Atallah, "Protecting Software Codes By Guards", CERIAS Technical Report 2001-49, 2001
|
5 |
Tao Zhang, Santosh Pande, Antonio Valverde, "Tamper-Resistant Whole Program Partitioning", Proc. Conference on Languages, Compilers, and Tools for Embedded Systems, June 2003
|
6 |
Sonali Gupta, "Code Obfuscation Part 3: Hiding Control Flows", http://pali sade.plynt.com, October 2005
|
7 |
Trusted Computing Group, "Trusted Platform Module (TPM) Specifications", https://www.trustedcomputing grop.org/specs/TPM/,2007
|
8 |
Sonali Gupta, "Code Obfuscation", http://palisade.plynt.com, August 2005
|
9 |
Christian S. Collberg, Clark Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation Tools for Software Protection", IEEE Transactions on Software Engineering, pp.735-746, August 2002
|
10 |
Gleb Naumovich, Nasir Memon, "Preventing Piracy, Reverse Engineering, and Tampering", Computer, pp.64-71, July 2003
|