[1] Yuichiro K, Akito M, Masahide N, et al. Exploiting self-modification mechanism for program protection //Proceedings of the 27th Annual International Computer Software and Applications Conference. Washington, DC, USA: IEEE Computer Society, 2003: 170-181.
[2] Yuichiro K, Akito M, Masahide N, et al. A software protection method based on instruction camouflage //Electronics and Communications in Japan (Part 3). Wiley Publishers, 2006, 89(1): 47-59.
[3] Yuichiro K, Akito M, Masahide N, et al. Program camouflage: a systematic instruction hiding method for protecting secrets //Proceedings of World Congress on Science, Engineering and Technology. Heidelberg, Germany: WASET, 2008, 33: 557-563.
[4] Linn C, Debray S. Obfuscation of executable code to improve resistance to static disassembly //Jajodia S, Atluri V, Jaeger T(eds). Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003). New York: ACM, 2003: 290-299.
[5] Madou M, Anckaert B, Moseley P, et al. Software protection through dynamic code mutation //Proceedings of the 6th International Workshop on Information Security Applications. Springer Berlin:Heidelberg, 2005, 3786: 194-206.
[6] Royal P, Halpin M, Dagon D, et al. PolyUnpack: Automating the hidden-code extraction of unpack-executing malware //Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference (ACSAC ’06). Washington, DC, USA: IEEE Computer Society, 2006: 289-300.
[7] Kang M, Poosankam P, Yin H. Renovo: A hidden code extractor for packed executables //Proceedings of the 5th ACM Workshop on Recurring Malcode (WORM 2007). New York: ACM, 2007: 46-53.
[8] Wu Y D, Zhao Z G, Chui T W. An attack on SMC-based software protection //Proceedings of the International Conference on Computational Science 2006 (ICCS 2006). Springer Berlin:Heidelberg, 2006, 4307: 352-368.
|