Keywords: obfuscation; source code; malware
@article{KYB_2012_48_3_a9,
author = {\v{D}urfina, Luk\'a\v{s} and Kol\'a\v{r}, Du\v{s}an},
title = {C source code obfuscator},
journal = {Kybernetika},
pages = {494--501},
year = {2012},
volume = {48},
number = {3},
language = {en},
url = {http://geodesic.mathdoc.fr/item/KYB_2012_48_3_a9/}
}
Ďurfina, Lukáš; Kolář, Dušan. C source code obfuscator. Kybernetika, Tome 48 (2012) no. 3, pp. 494-501. http://geodesic.mathdoc.fr/item/KYB_2012_48_3_a9/
[1] Free Software Foundation, Inc.: Volatiles – Using the GNU Compiler Collection. 2010, http://gcc.gnu.org/onlinedocs/gcc/Volatiles.html
[2] Harbour, N.: Advanced Software Armoring and Polymorphic Kung-Fu. DEFCON 16, 2008.
[3] Intel: Intel Architecture Software Developer's Manual Volume 2: Instruction Set Reference. 1999, http://download.intel.com/design/intarch/manuals/24319101.pdf
[4] Karnik, A., Goswami, S., Guha, R.: Detecting Obfuscated Viruses Using Cosine Similarity Analysis. Modelling Simulation, 2007.
[5] Low, D.: Protecting Java code via code obfuscation. In: Crossroads – Special Issue on Robotics, 1998.
[6] Microsoft: MSDN Library. http://msdn.microsoft.com/en-us/library/ms123401.aspx
[7] Moser, A., Kruegel, Ch., Kirda, E.: Limits of static analysis for malware detection. In: Computer Security Applications Conference, 2007.
[8] Savarese, Ch., Hart, B.: The Caesar Cipher. 1999, http://www.cs.trincoll.edu/ crypto/historical/caesar.html.