Appendix D. Citations

Table D.1. Table D.1

[Aleph1]

Aleph One, Smashing The Stack For Fun And Profit, Volume 7, Issue 49, http://www.phrack.org.

[anonymous]

anonymous, Once upon a free(), Phrack Volume 0x0b, Issue 0x39, http://www.phrack.org.

[Best]

Best; Robert, M., Microprocessor for executing enciphered programs, United States Patent 4,168,396, Filed October 31, 1977.

[blexim]

blexim, Basic Integer Overflows, Phrack Volume 0x0b, Issue 0x3c, http://www.phrack.org

[BSA1]

Business Software Alliance and IDC, BSA and IDC Global Software Piracy Study, July 2004, www.bsa.org/globalstudy

[Bulba]

Bulba and Kil3r, Bypassing StackGuard and StackShield, Phrack Volume 0xa, Issue 0x38, http://www.phrack.org.

[Červeň]

Pavol Červeň, Crackproof Your Software - The Best Ways to Protect Your Software Against Crackers, No Starch Press, 2002.

[Cifuentes1]

Cristina Cifuentes and Mike Van Emmerik, Recovery of Jump Table Case Statements from Binary Code, Proceedings of the International Workshop on Program Comprehension, May 1999.

[Cifuentes2]

C. Cifuentes, Reverse Compilation Techniques, PhD dissertation, Queensland University of Technology, School of Computing Science, July 1994.

[Cifuentes3]

C. Cifuentes, A Structuring Algorithm for Decompilation, In Proceedings of the XIX Conferencia Latinoamericana de Informatica, pages 267 – 276, Buenos Aires, Argentina, August 1993.

[Collberg1]

Christian Collberg, Clark Thomborson, Douglas Low, Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs, Principles of Programming ...

Get Reversing: Secrets of Reverse Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.