Collberg C, Thomborson C D. Low manufacturing cheap, resilient, and stealthy opaque constructs//Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. California: ACM, 1998: 184-196.
[2]
Barak B, Goldreich O, Impagliazzo R, et al. On the (im)possibility of obfuscating programs//Proc of CRYPTO-2001,LNCS 2139. Berlin: Springer-Verlag, 2001: 1-18.
Arboit G. A method for watermarking Java programs via opaque predicates//International Conference on Electronic Commerce Research (ICECR-5). Montreal:, 2002: 124-131.
[5]
Myles G, Collberg C. Software watermarking via opaque predicates: implementation, analysis, and attacks[J]. Electron Commerce Research, 2006, 4(6): 155-171.
[6]
Yuan Zheng, Wen Qiaoyan, Wu Wenling, et al. An ID-based watermarking scheme for Java programs//EUC Workshops 2006. Berlin: Springer-Verlag, 2006: 848-857.
[7]
潘承洞, 潘承彪. 初等数论[M]. 北京: 北京大学出版社, 1991. Pan Chengdong, Pan Chengbiao. Elementary numbers theory[M]. Beijing: Beijing University Publishing Company, 1991.
[8]
Collberg C. CS 620 security through obscurity. (2002).
[9]
李必信, 刘晓东, 郑滔, 等. 一种面向程序的分层切片方法[J]. 软件学报, 2001, 12(12): 1810-1817. Li Bixin, Liu Xiaodong, Zheng Tao, et al. An approach for hierarchy slicing object-oriented program[J]. Journal of Software, 2001, 12(12): 1810-1817.
[10]
?Alcianu S A, Rinard M. Pointer and escape analysis for multithreaded programs//Proc of 2001 ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPOPP '01). Snowbird: ACM, 2001: 12-23.