
13
REVISTA CUBANA
DE TRANSFORMACIÓN DIGITAL
Protección del código fuente ofuscando el grafo de llamadas
Rodríguez Véliz, M., Hernández González, A.,
Sepúlveda Lima, R., Núñez Musa, Y.
Fell, A., Pham, H. T., & Lam, S. (2019). TAD: Time Side-Channel Attack Defense of Obfuscated Source Code. 24th Asia
and South Pacific Design Automation Conference (ASP-DAC), (págs. 1-6). Tokyo.
doi:https://doi.org/10.1145/3287624.3287694
Gatica, J., Beron, M., Riesco, D., Pereira, M. J., Henriques, P., & Novais, P. (2023). Protección de activos de software.
XXV Workkshop de Investigación en Ciencias de la Computación, (págs. 699-703). Junín. Obtenido de
https://sedici.unlp.ed.ar/hadle/10915/164036
Hashemzade, B., & Abdolrazzagh-Nezhad, M. (2019). CSE: A Novel Dynamic Obfuscation Based on Control Flow,
Signals and Encryptio . Journal of Computing and Security,, 6, 53-63.
doi:https://doi.org/10.22108/jcs.2020.115402.1017
Khan, R. A., Khan, S. U., Khan, H. U., & Ilyas, M. (2022). Systematic literature review on security risks and its practices
in secure software development. ieee Access, 10, 5456-5481.
Kumar, A., & Sharma, S. (2019). Design and Implementation of Obfuscating Tool for Software Code Protection.
Advances in Interdisciplinary Engineering, (págs. 665–676). Singapore. doi:https://doi.org/10.1007/978-981-13-
6577-5_64
Li, Y., Xiong, X., & Zhao, Y. (2021). Code Obfuscation Based on Inline Split of Control Flow Graph. 2021 IEEE
International Conference on Artificial Intelligence and Computer Applications (ICAICA), (págs. 632-638). Dalian.
doi:https://doi.org/10.1109/ICAICAS2286.2021.9498241
Lv, D., Zhao, L., & Chen, B. (2022). Research Based on LLVM Code Obfuscation Technology. International Conference
on Industrial IoT, Big Data and Supply Chain (IIoTBDSC), (págs. 163-167). Beijing.
doi:https://doi.org/10.1109/IIoTBDSC57192.2022.00039
Mahoney, W., McDonald, J., Grispos, G., & Mandal, S. (2023). Improvements on Hiding x86-64 Instructions by
Interleaving. Proceedings of the 18th International Conference on Cyber Warfare and Security, (págs. 246-255).
Maryland. doi:https://doi.org/10.34190/iccws.18.1.987
Morrison, P., Moye, D., Pandita, R., & Laurie, W. (2018). Mapping the Field of Software Life Cycle Security Metrics.
Information and Software Technology, 102, 146-159. Obtenido de https://www.researchgate.net/profile/Dr-
Rafiq-
Khan/publication/341129438_The_State_of_the_Art_on_Secure_Software_Engineering_A_Systematic_Mappi
ng_Study/links/5eb1197292851cb267741f4c/The-State-of-the-Art-on-Secure-Software-Engineering-A-
Systematic-Mapping-Study.pdf
Ming Lu, K. (2019). Control flow obfuscation via CPS transformation. Proceedings of the 2019 ACM SIGPLAN
Workshop on Partial Evaluation and Program Manipulation (PEPM 2019). Association for Computing Machinery,
(págs. 54–60). New York. doi:https://doi.org/10.1145/3294032.3294083
Montejano Masa, J. P., Berón, M., Montejano, G. A., & Riesco, D. E. (2023). Métodos, técnicas y herramientas para la
protección de sistemas de software. XXV Workkshop de Investigación en Ciencias de la Computación, (págs. 719-
723). Junín. Obtenido de https://sedici.unlp.ed.ar/hadle/10915/164036
Moreno, A. (2023). Técnicas de evasión de antivirus y EDR. Tesis de grado, Escuela Técnica Superior de Ingeniería de
sistemas de la Universidad Politécnica de Madrid, Madrid. Obtenido de https://oa.upm.es/id/eprint/75850