Christian Collberg et al., “Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs”, Department of Computer Science, The University of Auckland, Auckland, New Zealand. |
David Aucsmith, et al., Intel Architecture Labs, “Tamper Resistant Software: An Implementation”, Proceedings of the First International Workshop on Information Hiding, 1996, Cambridge, U.K., pp. 1-10. |
Vega Technologies, Inc., “JZipper—a better way to jar Java classes”, Jul. 9, 1999, pp. 1-3. |
“A Java bytecode obfuscator”, promotional materials, (www.monmouth.com/˜neil/Obfuscate.html, Jun. 2, 1998, pp. 1-4. |
Eastridge Technology, “Jshrink: Java Shrinker and Obfuscator”, promotional materials, (www.e-t.com/jshrinkdoc.html), Jun. 2, 1998, pp. 1-4. |
Zelix KlassMaster, “It's a 2nd Generation Java Obfuscator”, promotional materials, (www.zelix.com/klassmaster/feature3.html, pp. 1-4. |
The art of obfuscation, promotional materials, (www.cwi.nl/˜tromp/maze.html), Jun. 2, 1998, pp. 1-5. |
True Obfuscation, promotional materials, (www.preemptive.com/DashO/obfuscate.html), Jun. 2, 1998, pp. 1-3. |
Obfuscator, “tech tools.*;//free tools for java”, promotional materials, (www.sbktech.org/hashjava_old.html), Jun. 2, 1998, pp. 1-9. |
“Number-Theoretic Algorithms”, Chapter 33, pp. 801-830. |
Frederick B. Cohen, “Operating System Protection Through Program Evolution,” 1993, Elsevier Science Publishers Ltd., pp. 565-584. |
U.S. patent application Ser. No. 10/031,834, Chow et al. |
U.S. patent application Ser. No. 09/377,312, Chow et al. |