[1] Collberg C, Thomborson C D. Low manufacturing cheap, resilient, and stealthy opaque constructs//Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. California: ACM, 1998: 184-196. [2] Barak B, Goldreich O, Impagliazzo R, et al. On the (im)possibility of obfuscating programs//Proc of CRYPTO-2001,LNCS 2139. Berlin: Springer-Verlag, 2001: 1-18. [3] 刘晓英, 沈金龙. 软件开发中的一个重要环节——混淆[J]. 南京邮电大学学报, 2004, 24(1): 59-63. [4] Arboit G. A method for watermarking Java programs via opaque predicates//International Conference on Electronic Commerce Research (ICECR-5). Montreal:, 2002: 124-131. [5] Myles G, Collberg C. Software watermarking via opaque predicates: implementation, analysis, and attacks[J]. Electron Commerce Research, 2006, 4(6): 155-171. [6] Yuan Zheng, Wen Qiaoyan, Wu Wenling, et al. An ID-based watermarking scheme for Java programs//EUC Workshops 2006. Berlin: Springer-Verlag, 2006: 848-857. [7] 潘承洞, 潘承彪. 初等数论[M]. 北京: 北京大学出版社, 1991. Pan Chengdong, Pan Chengbiao. Elementary numbers theory[M]. Beijing: Beijing University Publishing Company, 1991. [8] Collberg C. CS 620 security through obscurity. (2002). http://www. cs. arizona. edu/. collberg/Teaching/SoftwareSecurity. html. [9] 李必信, 刘晓东, 郑滔, 等. 一种面向程序的分层切片方法[J]. 软件学报, 2001, 12(12): 1810-1817. Li Bixin, Liu Xiaodong, Zheng Tao, et al. An approach for hierarchy slicing object-oriented program[J]. Journal of Software, 2001, 12(12): 1810-1817. [10] ?Alcianu S A, Rinard M. Pointer and escape analysis for multithreaded programs//Proc of 2001 ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPOPP '01). Snowbird: ACM, 2001: 12-23. |