Aleksandrina Kovacheva. Efficientcode obfuscation for Android[J]. Communications in Computer and Information Science, 2013, 409: 104-119.
[2]
Patrick Schulz. Android security analysis challenge: tampering Dalvik bytecode during runtime[EB/OL]. BlueboxSec, 2013. https://bluebox.com/technical/android-security-analysis-challenge-tampering-dalvik-bytecode-dur-ing-runtime.
[3]
Bill Horne, Lesley Matheson, Casey Sheehan, et al. Dynamic self-checking techniques for improved tamper resistance[J]. Security and Privacy in Digital Rights Management, 2002, 2320: 141-159.
[4]
Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 24(11): 612-613.