[1] GU Y X. Software security patterns: white-box attack analysis andsoftware protection technology[C]. Proceedings of the 1st Inter-national ACM Summer School on Information Security and Protection Theme on Software Security and Protection. New York: ACM, 2010: 7. [2] BARAK B, GOLDREICH O, IMPAGLIAZZO R, et al. On the (im)possibility of obfuscating programs[J]. Journal of the ACM, 2001, 59(2): 1-18. [3] COLLBERG C, THOMBORSON C, LOW D. A taxonomy of obfuscating transformations[R]. New Zealand: Department of Computer Science the University of Auckland, 1997: 148. [4] WROBLEWSKI G. General method of program code obfuscation[C]. International Conference on Software Engineering Research and Practice. 2002. [5] LACEY D, MOOR O D. Detecting disabling interference between program transformations[J]. 2001. [6] HEFFNER K, COLLBERG C S. The obfuscation executive[C]. Information Security, International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings. DBLP, 2004: 428-440. [7] 王怀军. 白盒环境中防动态攻击的软件保护方法研究[D]. 西安: 西北大学, 2014. WANG Huaijun. Research on software protection method against dynamic attack in white box environment[D]. Xi'an: Northwestern University, 2014. [8] 吴哲辉. Petri网导论[M]. 北京: 机械工业出版社, 2006. [9] 苏庆, 吴伟民, 李忠良, 等. 混沌不透明谓词在代码混淆中的研究与应用[J]. 计算机科学, 2013, 40(6): 155-159. SU Qing, WU Weimin, LI Zhongliang et, al. Research and application of chaos opaque predicate in code obfuscation[J]. Computer Science, 2013, 40(6): 155-159. [10] 刘鹏, 赵荣彩, 李朋远. 一种面向向量化的动态指针别名分析框架[J]. 计算机科学, 2015, 42(3): 26-30. LIU Peng, ZHAO Rongcai, LI Pengyuan. Dynamic pointer alias analysis framework for vectorization[J]. Computer Science, 2015, 42(3): 26-30. [11] 杨宇波. 代码混淆模型研究[D]. 北京: 北京邮电大学, 2015. YANG Yubo. Research on code obfuscation model[D]. Beijing: Beijing University of Posts and Telecommunications, 2015. [12] 朱正平, 钟诚, 陈东用. 一种基于执行路径隐藏的软件水印算法[J]. 计算机应用研究, 2006, 23(12): 118-120. ZHU Zhengping, ZHONG Cheng, CHEN Dongyong. Software watermarking algorithm based on hiding execution path of watermark-functions[J]. Application Research of Computers, 2006, 23(12): 118-120. [13] 许广莲, 房鼎益, 王怀军, 等. 一种白盒环境中抗动态攻击的软件保护方法[J]. 小型微型计算机系统, 2015, 36(9): 2062-2066. XU Guanglian, FANG Dingyi, WANG Huaijun, et al. Software protection method defending dynamic attack in white-box environment[J]. Journal of Chinese Computer Systems. 2015, 36(9): 2062-2066. [14] ZHANG Jinquan, NI Lina, JIANG Changjun. An algorithm to construct concurrent reachability graph of petri nets[J]. Journal of Donghua University(English Edition), 2004, 21(3): 180-184. [15] COLBERG C. Sandmark's home page[EB/OL]. http://sandmark.cs.arizona.edu. [16] 王磊, 侯整风, 向润昭, 等. 基于嵌套复杂度的控制流混淆算法[J]. 计算机工程, 2016, 42(11): 177-181. WANG Lei, HOU Zhengfeng, XIANG Runzhao, et al. A control flow obfuscation algorithm based on nested complexity[J]. Computer Engineering, 2016, 42(11): 177-181. |