Citation: | Liu Zhicheng, Zhou Bosheng. Software encryption and just-in-time decryption for software protection[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(06): 721-724. (in Chinese) |
[1] Devanbu P, Stubblebine S.Software engineering for security, a roadmap Proceedings of the Conference on the Future of Software Engineering. New York:ACM Press,2000:227-239 [2] Schneier B. 应用密码学,协议,算法和C源程序[M].第二版. 北京:机械工业出版社,1996:11-13 Schneier B. Applied cryptography, protocols, algorithms, and source code in C . 2nd ed. Beijing:China Machine Press,1996:11-13(in Chinese) [3] AYCOCK J.A brief history of just-in-time[J].ACM Computing Surveys, 2003, 35(2):97-113 [4] Cramer T, Friedman R, Miller T, et al. Compiling Java just in time[J]. IEEE Micro, 1997,17(3):36-43 [5] Collberg C, Thomborson C. Software watermarking:models and dynamic embeddings Principles of Programming Languages. San Antonio:ACM Press, 1999:311-324 [6] Collberg C, Thomborson C. Watermarking, tamper-proofing, and obfuscation-tools for software protection[J].IEEE Transactions on Software Engineering, 2002, 28:735-746 [7] Horne B, Matheson L R, Sheehan C, et al. Dynamic self-checking techniques for improved tamper resistance Security and Privacy in Digital Rights Management, LNCS 2320. London:Springer Verlag,2001:141-159
|