참고문헌
- M. K. Son and N. H. Kang, "Design and implementation of java crypto provider for android platform," J. KICS, vol. 37C, no. 09, pp. 851-858, Sept. 2012.
- B. H. Choi, H. J. Shim, C. H. Lee, S. W. Cho, and S. J. Cho, "An APK overwrite scheme for preventing modification of android applications," J. KICS, vol. 39B, no. 05, pp. 309-136, Jun. 2014.
- IDC, Android and iOS squeeze the competition, swelling to 96.3% of the smartphone operating system market for both 4Q14 and CY14, According to IDC(2015), Retrieved Mar., 12, 2015, from http://www. idc.com/getdoc.jsp?containerId=prUS25450615
- Y. K. Kim and H. Y. Youn, "The java decompilation-preventive method by java class file encryption," Korea Computer Congress 2009, vol. 36, no. 1C, pp. 571-574, Jeju Island, Korea, Jun. 2009.
- T. Varaneckas, README(readme.txt), Retrieved Mar, 12, 2015, from http://varaneckas.com/jad/
- B. Y. Lee and Y. S. Choi, "The status and analysis of obfuscation techniques and perspective development," J. Security Eng., vol. 5, no. 3, pp. 219-228, Jun. 2009.
- J. U. Noh, B. M. Cho, H. S. Oh, H. Y. Chang, M. Y. Jung, S. W. Lee, Y. S. Park, J. H. Woo, and S. J. Cho, "An implementation of control flow obfuscator for C++ language," Korea Computer Congress, vol. 33, no. 1, pp. 295-297, Yongpyong, Korea, Jun. 2006.
- C. Christian, C. Thomborson, and D. Low, "A taxonomy of obfuscating transformations," Dept. Computer Sci., The University of Auckland, New Zealand, 1997.
- Y. Piao, "Server-based bytecode obfuscation scheme for tamper detection of android applications," M. S. Thesis, Dept. Computer, Soongsil Univ., Korea, 2013.
- J. Y. Kim, N. H. Go, and Y. S. Park, "A code concealment method using java reflection and dynamic loading in android," J. The Korea Inst. Inf. Security & Cryptol., vol. 25, no. 1, pp. 17-30, Feb. 2015. https://doi.org/10.13089/JKIISC.2015.25.1.17
-
ORACLE, The Java
$^{TM}$ Tutorials - Trail: The Reflection API(2015), Retrieved Mar. 6, 2015, from http:/ /docs.oracle.com/javase/tutorial/reflect/ - M. Sosonkin, G. Naumovich, and N. Memon, "Obfuscation of design intent in objectoriented applications," in Proc. 3rd ACM Workshop on Digital Rights Management (DRM '03), pp. 142-153, Washington, DC, USA, Oct. 2003.
- PREEMPTIVE SOLUTIONS, User's Guide (2009), Retrieved Mar. 6, 2015., from http:// www.agtech.co.jp/products/preemptive/dasho/fi les/userguide6.pdf
- Y. Piao, J. H. Jung, and J. H. Yi, "Structural and functional analyses of ProGuard obfuscation tool," J. KICS, vol. 38B, no. 08, pp. 654-662, Aug. 2013.
- J. Hoenicke, JODE(2002), Retrieved Mar. 12, 2015., from http://jode.sourceforge.net/
- Retrologic Systems, User's Manual(2010), Retrieved Mar. 12, 2015., from http://www.ret rologic.com/retroguard-docs.html
- jarg, jarg - Java Archive Grinder(2003), Retrieved Mar. 12, 2015., from http://jarg.sou rceforge.net
-
yWorks, yGuard - Java
$^{TM}$ Bytecode Obfuscator and Shrinker(2015), Retrieved Mar. 12, 2015., from http://www.yworks.com/en/products_ygua rd_about.html - V. Raychev, M. Vechev, and A. Krause, "Predicting program properties from "Big Code"," in Proc. 42nd Annu. ACM SIGPLANSIGACT Symp. Principles of Programming Languages, pp. 111-124, Mumbai, India, Jan. 2015.
- B. Taskar, C. Guestrin, and D. Koller, "Max-margin markov networks," Advances in Neural Inf. Process. Syst. 16 (NIPS 2003), pp. 25-32, Vancouver and Whistler, British Columbia, Canada, Dec. 2003.
-
ORACLE, Java
$^{TM}$ Platform, Standard Edition 7 - API Specification(2014), Retrieved Mar., 12, 2015, from http://docs.oracle.com/javase/7/ docs/api/ - tutorialspoint, Java Tutorial(2014) Retrieved Mar., 9, 2015, from http://www.tutorialspoint.com/java/
- OREANS TECHNOLOGIES, THEMIDA OVERVIEW(2015), Retrieved Mar. 12, 2015, from http://www.oreans.com/themida.php