|
1. Pamela Samuelson. Reverse-engineering Someone Else’s Software: Is It Legal? IEEE Software, page 90-96, January 1990. 2. Apple’s QuickTime lawsuit. http://www.macworld.com/pages/june.95/News.848.html and http://www.macworld.com/pages/may.95/News.705.html, May-June 1995. 3. David Aucsmith. Tamper Resistant Software. In Information hinding, pages 317-334, May/June 1986. LNCS 1174. 4. James R. Gosler. Software Protection: Myth or Reality? In CRYPTO’85 — Advances in Cryptology, pages 140-157, August 1985. 5. Christina Cifuentes and K. John Gough. Decompilation of Binary Programs. Software — Practice & Experience, 25(7):811-829, July 1995. 6. Amir Herzberg and Shlomit S. Pinter. Public Protection of Software. ACM Transactions on Computer Systems, 5(4):371-393, November 1987. 7. Uwe G. Wilhelm. Cryptographically Protected Objects. http://lsewww.epfl.ch/~wilhelm/CryPO.html, 1997. 8. Tim Lindholm and Frank Yellin, The Java Virtual Machine Specification, 2nd Ed. 1999, Addision-Wesley. 9. Christian Collberg, Clark Thomboson, and Douglas Low. A Taxonomy of Obfuscating Transforms. Technical Report 148, Department of Computer Science, University of Auckland, July 1997. http://www.cs.auckland.ac.nz/~collberg/Research/Publications/CollbergThomborsonLow97a/index.html. 10. Christian Collberg, Clark Thomboson, and Douglas Low. Manufacturing Cheap, Resident, and Stealthy Opaque Constructs. SIGPLAN-SIGACT POPL’98. ACM Press, San Diego, CA, January 1998. http://www.cs.auckland.ac.nz/~collberg/Research/Publications/CollbergThomborsonLow98a/index.html. 11. Christian Collberg, Clark Thomboson, and Douglas Low. Breaking Abstractions and Unstructuring Data Structures. Computer Languages, 1998. Proceedings. 1998 International Conference, pages: 28 — 38. 12. Godfrey Nolan, Decompiling Java, http://www.riis.com/depile.html
|