[1] COLLBERG C S,THOMBORSON C.Watermarking,tamper-proofing,and obfuscation-tools for software protection[J].IEEE Transactions on Software Engineering,2002,28(8):735-746.
[2] Wikipedia Contributors.Reverse engineering[EB/OL].[2020-05-16].https://en.wikipedia.org/wiki/Reverse_engineering.
[3] COLLBERG C,THOMBORSON C,LOW D.A taxonomy of obfuscating transformations[R].New Zealand:The University of Auckland.Department of Computer Science,1997.
[4] BROUKHIS L.The international obfuscated C code contest[EB/OL].[2020-06-03].https://ioccc.org/.
[5] Guardsquare.ProGuard[EB/OL].[2020-06-04].https://www.guardsquare.com/en/products/proguard.
[6] FOKET C,DE BOSSCHERE K,DE SUTTER B.Effective and efficient Java-type obfuscation[J].Software:Practice and Experience,2020,50(2):136-160.
[7] WARREN H S.Hacker’s delight[M].Hoboken:Addison-Wesley Professional,2012:10-11.
[8] 吴伟民,林水明,林志毅.一种基于混沌不透明谓词的压扁控制流算法[J].计算机科学,2015,42(5):178-182.
WU W M,LIN S M,LIN Z Y.Chaotic-based opaque predicate control flow flatten algorithm[J].Computer Science,2015,42(5):178-180.
[9] MING J,XU D,WANG L,et al.Loop:logic-oriented opaque predicate detection in obfuscated binary code[C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,2015:757-768.
[10] DRAPE S.Intellectual property protection using obfuscation[R].Oxford:Oxford University Computing Laboratory,2010.
[11] XU D,MING J,WU D.Generalized dynamic opaque predicates:a new control flow obfuscation method[C]//International Conference on Information Security.Cham:Springer,2016:323-342.
[12] TOFIGHI-SHIRAZI R,ASAVOAE I M,ELBAZ-VINCENT P,et al.Defeating opaque predicates statically through machine learning and binary analysis[C]//Proceedings of the 3rd ACM Workshop on Software Protection,2019:3-14.
[13] LASZLO T,KISS A.Obfuscating C++ programs via control flow flattening[C]//Proc of the 10th Symposium on Programing Languages and Software Tools,2007:3-19.
[14] Naville.Hikari[EB/OL].[2020-06-04].https://github.com/HikariObfuscator/Hikari.
[15] Hex-Rayd.IDA Pro[EB/OL].[2020-06-04].https://www.hex-rays.com/products/ida/.
[16] FALCARIN P.Software protection[J].IEEE Software,2011,28(2):24-27.
[17] JUNOD P,RINALDINI J,WEHRLI J,et al.Obfuscator-LLVM--software protection for the masses[C]//2015 IEEE/ACM 1st International Workshop on Software Protection,2015:3-9.
[18] Free Software Foundation.GNU operating system[EB/OL].[2020-06-17].http://www.gnu.org/software/coreutils/.
[19] BRAD C.Crypto-algorithms[EB/OL].[2020-06-17].https://github.com/B-Con/crypto-algorithms.
[20] Packetizer Forums.AES Crypt[EB/OL].[2020-06-18].https://www.aescrypt.com/.
[21] SEWARD J.Bzip2[EB/OL].[2020-06-18].http://www.bzip.org/.