Computer Science ›› 2019, Vol. 46 ›› Issue (4): 197-202.doi: 10.11896/j.issn.1002-137X.2019.04.031
• Information Security • Previous Articles Next Articles
SU Qing, LIN Ze-ming, LIN Zhi-yi, HUANG Jian-feng
CLC Number:
[1]GAO Y,CHEN Y Y.A Comparable Code Obfuscation Framework Measuring Efficiency Based on Abstract Interpretation[J].Chinese Journal of Computer,2007,30(5):806-814.(in Chinese) 高鹰,陈意云.基于抽象解释的代码迷惑有效性比较框架[J].计算机学报,2007,30(5):806-814. [2]SHENEAMER A,ROY S,KALITA J.A Detection Framework for Semantic Code Clones and Obfuscated Code[J].Expert Systems with Applications,2017,97(1):405-420. [3]ZHAO Y J,TANG Z Y,WANG N,et al.Evaluation of Code Obfuscating Transformation[J].Journal of Software,2012,23(3):700-711.(in Chinese) 赵玉洁,汤战勇,王妮,等.代码混淆算法有效性评估[J].软件学报,2012,23(3):700-711. [4]CECCATO M,PENTA M,FALCARIN P,et al.A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques[J].Empirical Software Enginee-ring,2014,19(4):1040-1074. [5]CECCATO M,PREDA M D,NAGRA J,et al.Trading-off security and performance in barrier slicing for remote software entrusting[J].Automated Software Engineering,2009,16(2):235-261. [6]COLLBERG C,THOMBORSON C,LOW D.A Taxonomy of Obfuscating Transformations:TR:148[R].New Zealand:Department of Computer Science,University of Auckland,1997. [7]BERTHOLON B,VARRETTE S,BOUVRY P.JShadObf:A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms[C]∥Proceeding of the IEEE International Confe-rence on Network & System Security.IEEE,2013. [8]LIN S M,WU W M,TAO G H,et al.PCA-based code obfuscation effective comprehensive assessment model[J].Application Research of Computers,2016,33(9):2819-2822.(in Chinese) 林水明,吴伟民,陶桂华,等.基于主成分分析的代码混淆有效性综合评估模型[J].计算机应用研究,2016,33(9):2819-2822. [9]XIE X,LIU F L,LU B,et al.Quantitative Evaluation for Effectiveness of Code Obfuscation Based on Multi-level Weighted Attributes[J].Computer Science,2015,42(3):167-173.(in Chinese) 谢鑫,刘粉林,芦斌,等.基于多层次属性加权的代码混淆有效性量化评估[J].计算机科学,2015,42(3):167-173. [10]ZHANG X H,FENG Y J.A Nonlinear Fuzzy Comprehensive Assessment Model[J].System Engineering Theory and Practice,2005,25(10):54-59.(in Chinese) 张晓慧,冯英浚.一种非线性模糊综合评价模型[J].系统工程理论与实践,2005,25(10):54-59. [11]ZIMMERMANN H J.Fuzzy Set Theory—and Its Applications[M].Netherlands:Kluwer Academic Publishers,1996. [12]PARR B T.The Definitive ANTLR 4 Reference[M].The United States of America:Pragmatic Bookshelf,2013. |
[1] | WANG Jian-ming, CHEN Xiang-yu, YANG Zi-zhong, SHI Chen-yang, ZHANG Yu-hang, QIAN Zheng-kun. Influence of Different Data Augmentation Methods on Model Recognition Accuracy [J]. Computer Science, 2022, 49(6A): 418-423. |
|