[1] Falcarin P,et al.Guest editors' introduction:software protection[J].IEEE Software,2011,28(2):24-27.
[2] The Compliance Gap:BSA Global Software Survey[EB/OL].Washington,DC:BSA,June 2014[2014-08-01].http://globalstudy.bsa.org/2013/downloads/studies/2013GlobalSurvey_Study_en.pdf.
[3] Eighth Annual BSA and IDC Global Software Piracy Study[EB/OL].Washington,DC:BSA,2011[2013-01-26].http://portal.bsa.org/globalpiracy2010/downloads/study_pdf/2010_BSA_Piracy_Study-Standard.pdf.
[4] King J.Symbolic execution and program testing[J].Communications of the ACM,1976,19(7):385-394.
[5] Newsome J,Song D.Dynamic taint analysis for automatic detection,analysis,and signature generation of exploits on commodity software[A].Proceedings of the Network and Distributed System Security Symposium[C].Rosten,VA:Internet Society,2005.
[6] Ganesh V,Dill D.A decision procedure for bit-vectors and arrays[A].Proceedings of International Conference on Computer Aided Verification[C].Berlin:Springer,2007.519-531.
[7] Nethercote N,Seward J.Valgrind:a framework for heavyweight dynamic binary instrumentation[A].Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation[C].New York:ACM,2007.89-100.
[8] Wang C,Davidson J,Hill J,et al.Protection of software-based survivability mechanisms[A].Proceedings of the International Conference on Dependable Systems and Networks[C].Piscataway,NJ:IEEE,2001.193-202.
[9] Linn C,Debray S.Obfuscation of executable code to improve resistance to static disassembly[A].Proceedings of ACM Conference on Computer and Communication Security[C].New York,NY:ACM,2003.290-299.
[10] Myles G,Collberg C.Software watermarking via opaque predicates:implementation,analysis,and attacks[J].Electronic Commerce Research,2006,6(2):155-171.
[11] Birrer B,Raines R,Baldwin R,et al.Programfragmentation as a metamorphic software protection[A].Proceedings of the International Symposium on Information Assurance and Security[C].Piscataway,NJ:IEEE,2007.369-374.
[12] Xu J,Fan J,Ammar M,et al.Prefix-preserving IP address anonymization:measurement-based security evaluation and a new cryptography-based scheme[A].Proceedings of the IEEE International Conference on Network Protocols[C].Piscataway,NJ:IEEE,2002.280-289.
[13] Li J,Omiecinski E.Efficiency and security trade-off in supporting range queries on encrypted databases[A].Proceedings of the Annual IFIP WG 11.3 Working Conference on Data and Applications Security[C].Berlin:Springer,2005.69-83.
[14] Sharif M,Lanzi A,Giffin J,et al.Impeding malware analysis using conditional code obfuscation[A].Proceedings of the Network and Distributed System Security Symposium[C].Rosten,VA:Internet Society,2008.321-333.
[15] Amanatidis G,et al.Provably-secureschemes for basic query support in outsourced databases[A].Proceedings of the Annual IFIP WG 11.3 Working Conference on Data and applications security[C].Berlin:Springer-Verlag,2007.14-30.
[16] Xiao L,Yen,I.Security analysis and enhancement for prefix-preserving encryption schemes[R].Richardson,Texas:Department of Computer Science,UT Dallas,2012.
[17] 贾春福,王志,刘昕,等.路径模糊:一种有效抵抗符号执行的二进制混淆技术[J].计算机研究与发展,2011,48(11):2111-2119. Jia Chunfu,Wang Zhi,Liu Xin,et al.Branch obfuscation:An efficient binary code obfuscation to impede symbolic execution[J].Journal of Computer Research and Development,2011,48(11):2111-2119.(in Chinese)
[18] Andriesse D and Bos H.Instruction-level steganography for covert trigger-based malware[A].Proceedings of Conference on Detection of Intrusion and Malware & Vulnerability Assessment[C].Berlin:Springer,2014.41-45.
[19] 王怀军,等.基于变形的二进制代码混淆技术研究[J].四川大学学报:工程科学版,2014,46(01):14-21. Wang Huaijun,Fang Dingyi,Li Guanghui,et al.Research on deformation based binary code obfuscation technology[J].Journal of Sichuan University (Engineering Science Edition),2014,46(01):14-21.(in Chinese)
[20] 何炎祥,等.基于程序流敏感的自修改代码混淆方法[J].计算机工程与科学,2012,34(1):79-85. HE Yan-xiang,CHEN Yong,WU Wei,et al.A program flow-sensitive self-modifying code obfuscation method[J].Computer Engineering & Science,2012,34(1):79-85.(in Chinese)
[21] Falcarin P,et al.Exploiting code mobility for dynamic binary obfuscation[A].Proceedings of the World Congress on Internet Security[C].Piscataway,NJ:IEEE,2011.114-120.
[22] Ceccato M,TonellaP.CodeBender:remote software protection using orthogonal replacement[J].IEEE Software,2011,28(2):28-34.
[23] Wang Zhi,Jia Chunfu,Liu Min,et al.Branch obfuscation using code mobility and signal[A].Proceedings of IEEE Workshop on Security,Trust,and Privacy for Software Applications[C].Piscataway,NJ:IEEE,2012.
[24] Wang Zhi,Ming Jiang,Jia Chunfu,et al.Linear obfuscation to combat symbolic execution[A].Proceedings of European Symposium on Research in Computer Security[C].Berlin:Springer,2011.210-226. |