2 Behrens B,Levary R.Practical Legal Aspects of Software Reverse Engineering[J],Communications of the ACM.1998,41(2):27 -29.
3 Cifuentes,Cristina,K.John Gough.Decompilation of Binary Programs[J],Software-Practice and Experience.1995,25(7):811 -829.
4 Chan Jien-Tsai,Yang Wu.Advanced Obfuscation Techniques for Java Bytecode[J],Journal of Systems and Software Volume.2004,71(1):1 -10.
5 Berghei H.Wartermarking Cyberspace[J],Communications of the ACM.1997,40(11):19 -24.
6 Ichisugi Y.Watermark for Software and its Insertion,Attacking,Evaluation and Implementation Methods[A],Summer Symposium on Programming,IPSJ[C].1997:57-64.
7 Hanpeter van Vliet.Mocha,the Java Decompiler[EB/OL].http://www.brouhaha.com/~ eric/software/mocha/.
8 Martyn Honeyford.Weighing in on Java native compilation[EB/OL].http://www-900.ibm.com/developerworks/cn/java/j-native/index.shtml.