1StytzM R,Whittaker JA.“Software protection:security’s last stand”[J].IEEE Magazine on Security&Privacy,2003,1(1):95-98.
2ZambrenoJ,ChoudharyA,SimhaR,etal“.Flexible software protec-tion using hardware/software codesign techniques”[A].In:Proc of2004 Europe Conf and Exhibition on Design,Automation and Test[C].Paris:IEEE Press,2004,636-641.
7Hoi Chang, Mikhail J Atallah. Protecting software code by guards[ C]//Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management. 2002 : 160-175.
8Dong Zhang. Checking Primitives with Guards [ D ]. University of Auckland,2005.
9Sudeep Ghosh, Jason D Hiser, Jack W Davidson. A secure and robust approach to software tamper resistance [ C ]// Proceedings of the 12th International Conference on Information Hiding. 2010:33-47.
10Homing James J, Sibert W Olin, Tarjan Robert E, et al. Software Self-defense Systems and Methods: USA, 7430670 [ P]. 2008-09-30.