Random table and hash coding-based binary code obfuscation against stack trace analysis

Xin Xie, Bin Lu, Daofu Gong, Xiangyang Luo, Fenlin Liu. Random table and hash coding-based binary code obfuscation against stack trace analysis. IET Information Security, 10(1):18-27, 2016. [doi]

@article{XieLGLL16,
  title = {Random table and hash coding-based binary code obfuscation against stack trace analysis},
  author = {Xin Xie and Bin Lu and Daofu Gong and Xiangyang Luo and Fenlin Liu},
  year = {2016},
  doi = {10.1049/iet-ifs.2013.0137},
  url = {http://dx.doi.org/10.1049/iet-ifs.2013.0137},
  researchr = {https://researchr.org/publication/XieLGLL16},
  cites = {0},
  citedby = {0},
  journal = {IET Information Security},
  volume = {10},
  number = {1},
  pages = {18-27},
}