“Compiliers: Principles, Techniques, and Tools”, ISBN 0-201-10088-6, pp. 666-668. |
Frederick B. Cohen, Operating System Protection Through Program Evolution, 1993, 20 pages. |
Libes, Don, 1993, “The Art of Obfuscation”, “Obfuscated C and Other Mysteries” John Wiley & Sons, p. 425. |
“Number-Theoretic Algorithms”, Chapter 33, pp. 801-830. |
“True Obfuscation”, DashO(tm)—Java Code Optimizer, Jun. 1998, http://www.preemptive.com/DashO/obfuscate.htm. |
“Obfuscator”, Jun. 1998, http://www.sbktech.org/hashjava_old.html. |
“Your Java program is an open book”, Eastridge Technology, 1997, http://www.e-t.com/jshrink.html. |
Aggarwal, Neil, “A Java bytecode obfuscator”, Jun. 1998, http://www.monmouth.com/˜neil/Obfuscate.html. |
“Zelix KlassMaster”, 1999, http://www.zelix.com/klassmaster/index.html. |
“JZipper—a better way to jar Java classes”, Jul. 1999, http://www.vegatech.net/jzipper/jzipabout.htm. |
Aucsmith, David. Graunke, Gary, 1996, Tamper Resistant Software: An Implementation:, pp. 1-10. |
Christian Collberg, et al., “Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs”, The University of Auckland, New Zealand. |