Appendix D. Citations
Table D.1. Table D.1
[Aleph1] | Aleph One, Smashing The Stack For Fun And Profit, Volume 7, Issue 49, |
[anonymous] | anonymous, Once upon a free(), Phrack Volume 0x0b, Issue 0x39, |
[Best] | Best; Robert, M., Microprocessor for executing enciphered programs, United States Patent 4,168,396, Filed October 31, 1977. |
[blexim] | blexim, Basic Integer Overflows, Phrack Volume 0x0b, Issue 0x3c, |
[BSA1] | Business Software Alliance and IDC, BSA and IDC Global Software Piracy Study, July 2004, |
[Bulba] | Bulba and Kil3r, Bypassing StackGuard and StackShield, Phrack Volume 0xa, Issue 0x38, |
[Červeň] | Pavol Červeň, Crackproof Your Software - The Best Ways to Protect Your Software Against Crackers, No Starch Press, 2002. |
[Cifuentes1] | Cristina Cifuentes and Mike Van Emmerik, Recovery of Jump Table Case Statements from Binary Code, Proceedings of the International Workshop on Program Comprehension, May 1999. |
[Cifuentes2] | C. Cifuentes, Reverse Compilation Techniques, PhD dissertation, Queensland University of Technology, School of Computing Science, July 1994. |
[Cifuentes3] | C. Cifuentes, A Structuring Algorithm for Decompilation, In Proceedings of the XIX Conferencia Latinoamericana de Informatica, pages 267 – 276, Buenos Aires, Argentina, August 1993. |
[Collberg1] | Christian Collberg, Clark Thomborson, Douglas Low, Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs, Principles of Programming ... |
Get Reversing: Secrets of Reverse Engineering now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.