[1] A. Pretschner, “Code Obfuscation Against Symbolic Execution Attacks” inProceedings of Conference on Computer Security Applications(ACM), pp. 189-200, December 2016 [2] M. Ceccato, M. D. Penta,P. Falcarin, “A Family of Experiments to Assess the Effectiveness and Efficiency of Source Code Obfuscation Techniques,” Empirical Software Engineering, Vol. 19, No. 4, pp. 1040-1074, 2014 [3] A. Viticchie, L. Regano,M. Torchiano, “Assessment of Source Code Obfuscation Techniques” in Proceedings of International Working Conference on Source Code Analysis and Manipulation, pp.11-20, October 2016 [4] M. L. Shao, D. Y. Qi,W. J. Liu, “Polymorphic Inline Code Obfuscation Algorithm,” Application Research of Computers, Vol. 32, No. 6, pp. 1787-1790, 2015 [5] Z. Wang, C. F. Jia,W. J. Liu, “Branch Obfuscation to Combat Symbolic Execution,” Acta Electronica Sinica, Vol. 43, No. 5, pp. 870-878, 2015 [6] Y. Y.Sun and G. Q. Huang, “ A Control Flow Obfuscation Scheme based on Garbage Code,” Journal of Theoretical & Applied Information Technology, Vol. 46, No. 1, pp. 284-288, 2013 [7] D. M. Chen, X. H. Fan,J. Zhu, “Obfuscation Algorithms based on Congruence equation and Chinese Remainder Theorem,” Application Research of Computers, Vol. 32, No. 2, pp. 485-488, 2015 [8] Q. Su, W. M. Wu,Z. L. Li, “Research and Application of Chaos Opaque Predicate in Code Obfuscation,” Computer Science, Vol. 40, No. 6, pp. 155-159, 2013 [9] H. Jiang, Y. LIu,X. Wang, “Code Confusion Technology Research based on Control Flow,” Application Research of Computers, Vol. 30, No.3, pp. 897-899, 2013 [10] X. Xie, F. L. Liu,B. Lu, “Quantitative Evaluation for Effectiveness of Code Obfuscation based on Multi-Level Weighted Attributes,” Computer Science, Vol. 42, No. 3, pp. 167-173, 2015 |