Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2009_10_a25, author = {A. G. Pozdeev and V. N. Krivopalov and E. V. Romashkin and E. D. Radchenko}, title = {Mathematical and software tools for programs obfuscation}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {52--53}, publisher = {mathdoc}, number = {10}, year = {2009}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2009_10_a25/} }
TY - JOUR AU - A. G. Pozdeev AU - V. N. Krivopalov AU - E. V. Romashkin AU - E. D. Radchenko TI - Mathematical and software tools for programs obfuscation JO - Prikladnaâ diskretnaâ matematika PY - 2009 SP - 52 EP - 53 IS - 10 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDM_2009_10_a25/ LA - ru ID - PDM_2009_10_a25 ER -
%0 Journal Article %A A. G. Pozdeev %A V. N. Krivopalov %A E. V. Romashkin %A E. D. Radchenko %T Mathematical and software tools for programs obfuscation %J Prikladnaâ diskretnaâ matematika %D 2009 %P 52-53 %N 10 %I mathdoc %U http://geodesic.mathdoc.fr/item/PDM_2009_10_a25/ %G ru %F PDM_2009_10_a25
A. G. Pozdeev; V. N. Krivopalov; E. V. Romashkin; E. D. Radchenko. Mathematical and software tools for programs obfuscation. Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 52-53. http://geodesic.mathdoc.fr/item/PDM_2009_10_a25/
[1] Collberg C., Thomborson C., Low D., Manufacturing cheap, resilient, and stealthy opaque constructs, Proc. Symp. Principles of Programming Languages (POPL'98), 1998, Jan.
[2] Collberg C., Thomborson C., Low D., Taxonomy of Obfuscating Transformations, Rezhim dostupa: , svobodnyi http://www.cs.arizona.edu/collberg/ Research/Publications/CollbergThomborsonLow97a/index.html
[3] Chernov A. V., Issledovanie i razrabotka metodologii maskirovki programm, Dis. kand. fiz.-mat. nauk, Mosk. gos. un-t im. M. V. Lomonosova, M., 2003, 133 pp.
[4] Lifshits Yu. M., Zaputyvanie (obfuskatsiya) programm. Obzor., SPb. otd. Mat. inst. im. V. A. Steklova RAN, SPb., 2004; Режим доступа: , свободный http://logic.pdmi.ras.ru/~yura/of/survey1.pdf
[5] Chernov A. V., Analiz zaputyvayuschikh preobrazovanii programm. Biblioteka analiticheskoi informatsii [Elektronnyi resurs], Rezhim dostupa: , svobodnyi http://www.citforum.ru/security/articles/analysis/
[6] Barak B., Goldreich O., Impagliazzo R. et al., “On the (Im)possibility of Obfuscation Programs”, LNCS, 2139, 2001, 1–18 | MR | Zbl