B. Anckaert, M. Madou, B. D. Sutter, B. D. Bus, K. D. Bosschere et al., Program obfuscation, Proceedings of the 2007 ACM workshop on Quality of protection , QoP '07, 2007.
DOI : 10.1145/1314257.1314263

D. Aucsmith, Tamper resistant software: an implementation, Proceedings of the First International Workshop on Information Hiding, pp.317-333, 1996.
DOI : 10.1007/3-540-61996-8_49

H. Chang and M. Atallah, Protecting Software Code by Guards, Proceedings ACM Workshop on Digital Rights Management, pp.160-175, 2001.
DOI : 10.1007/3-540-47870-1_10

Y. Chen, R. Venkatesan, M. Cary, R. Pang, S. Sinha et al., Oblivious Hashing: A Stealthy Software Integrity Verification Primitive, Proceedings of 5th Information Hiding Workshop, pp.400-414, 2003.
DOI : 10.1007/3-540-36415-3_26

N. Dedic, M. Jakubowski, and R. Venkatesan, A graph game model for software tamper protection, Proceedings of 9th Information Hiding Workshop, 2007.

B. Horne, L. R. Matheson, C. Sheehan, and R. E. Tarjan, Dynamic Self-Checking Techniques for Improved Tamper Resistance, DRM '01: Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management, pp.141-159, 2002.
DOI : 10.1007/3-540-47870-1_9

H. Jin, G. Myles, and J. Lotspiech, Towards Better Software Tamper Resistance, Information Security: 8th International Conference, pp.417-430, 2005.
DOI : 10.1007/11556992_30

M. Mambo, T. Murayama, and E. Okamoto, A tentative approach to constructing tamper-resistant software, Proceedings of the 1997 workshop on New security paradigms , NSPW '97, pp.23-33, 1998.
DOI : 10.1145/283699.283736

G. Myles and C. Collberg, K-gram based software birthmarks, Proceedings of the 2005 ACM symposium on Applied computing , SAC '05, pp.314-318, 2005.
DOI : 10.1145/1066677.1066753