[1]Landwehr C E, Bull A R, Mcdermott J P, et al. A taxonomy of computer program security flaws[J]. ACM Computing Surveys, 1993, 26(3): 211254[2]Wahbe R, Lucco S, Anderson T E, et al. Efficient softwarebased fault isolation[J]. ACM SIGOPS Operating Systems Review, 2000, 27(5): 203216[3]张玉清, 王凯, 杨欢, 等. Android安全综述[J]. 计算机研究与发展, 2014, 51(7): 13851396[4]陈佳霖. iOS平台应用程序安全性研究[D]. 上海: 上海交通大学, 2014[5]Anckaert B, Jakubowski M, Venkatesan R, et al. Runtime randomization to mitigate tampering[C] Proc of the 2nd Int Workshop on Security:Advances in Information and Computer Security(IWSEC2007). New York: ACM, 2007: 153168[6]Barak B, Goldreich O, Impagliazzo R, et al. On the (im)possibility of obfuscating programs [J]. Journal of the ACM, 2012, 59(2): 118[7]Sebastian S A, Malgaonkar S, Shah P, et al. A study & review on code obfuscation[C] Proc of World Conf on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave). Piscataway, NJ: IEEE, 2016: 16[8]Collberg C S, Thomborson C, Low D. A taxonomy of obfuscating transformations[R]. Auckland, New Zealand : The University of Auckland, 1997[9]Collberg C S, Thomborson C. Watermarking, tamperproofing, and obfuscationtools for software protection[J]. IEEE Trans on Software Engineering, 2002, 28(8): 735746[10]Cohen F B. Operating system protection through program evolution [J]. Computers & Security, 1993, 12(6): 565584[11]Cohen F B, Cohen D F. A Short Course on Computer Viruses[M]. Hoboken, NJ: John Wiley & Sons, Inc, 1994[12]Chan J T, Yang W. Advanced obfuscation techniques for Java bytecode[J]. Journal of Systems & Software, 2004, 71(12):110[13]Chen H, Yuan L, Wu X, et al. Control flow obfuscation with information flow tracking[C] Proc of IEEEACM Int Symp on Microarchitecture. New York: ACM, 2009: 391400[14]Preda M D, Madou M, Bosschere K D, et al. Opaque predicates detection by abstract interpretation[C] Proc of Int Conf on Algebraic Methodology and Software Technology, Kuressaare, Estonia. New York: ACM, 2006: 8195 [15]Wang C, Hill J, Knight J C, et al. Protection of softwaresased survivability mechanisms[C] Proc of Int Conf on Dependable Systems and Networks. Los Alamitos: IEEE Computer Society, 2001: 193202[16]Cesare S, Xiang Y. Classification of malware using structured control flow[C] Proc of the 8th Australasian Symp on Parallel and Distributed Computing. Sydney: Australian Computer Society, Inc, 2010: 6170[17]Gentry C, Sahai A, Waters B. Homomorphic encryption from learning with errors: Conceptuallysimpler, asymptoticallyfaster, attributebased[C] Proc of Advances in Cryptology—CRYPTO 2013. Berlin: Springer, 2013: 7592[18] Ansel J, Marchenko P, Erlingsson,et al. Languageindependent sandboxing of justintime compilation and selfmodifying code[J]. ACM SIGPLAN Notices, 2011, 46(6): 355366[19]Myles G, Collberg C. Software watermarking via opaque predicates: Implementation, analysis, and attacks[J]. Electronic Commerce Research, 2006, 6(2): 155171[20]Bedrune J B, ricFiliol, Raynal F. Cryptography: Allout attacks or how to attack cryptography without intensive cryptanalysis[J]. Journal of Computer Virology and Hacking Techniques, 2010, 6(3): 207237[21]Pietro R D, Mancini L V, Soriente C, et al. Playing hideandseek with a focused mobile adversary in unattended wireless sensor networks[J]. Ad Hoc Networks, 2009, 7(8): 14631475[22]Zhu W, Thomborson C, Wang F Y. Obfuscate arrays by homomorphic functions[C] Proc of IEEE Int Conf on Granular Computing. Piscataway, NJ: IEEE, 2006: 770773[23]Wang C. A security architecture for survivability mechanisms[D]. Virginia: University of Virginia, 2001[24]Collberg C, Thomborson C, Low D. Breaking abstractions and unstructuring data structures[C] Proc of IEEE Int Conf on Computer Languages. Piscataway, NJ: IEEE, 1998: 2838[25]Anna L, Matt B, Reisse A, et al. Selfprotecting mobile agents obfuscation report[R]. Virginia: Network Associates Laboratories, 2003[26]Anckaert B, Jakubowski M, Venkatesan R. Proteus: Virtualization for diversified tamperresistance[C] Proc of ACM Workshop on Digital Rights Management. New York: ACM, 2006: 4758[27]Kanzaki Y, Monden A, Nakamura M, et al. Exploiting selfmodification mechanism for program protection[C] Proc of Int Conf on Computer Software and Applications. Los Alamitos: IEEE Computer Society, 2003: 170179[28]Aucsmith D. Tamper resistant software: An implementation[G] LNCS 1174. Berlin: Springer, 1996: 317333 [29]Madou M, Anckaert B, Moseley P, et al. Software protection through dynamic code mutation[C] Proc of Int Conf on Information Security Applications. Berlin: Springer, 2005: 194206
|