[1] C. Collberg and J. Nagra, “Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection,” Addison-Wesley Professional, 2009.
[2] H. B. Enderton, “Set Theory—An Introduce to Independence Proofs,” North Holland Publishing Company, 1977.
[3] C. Y. Luo, G. S. Deng and Y. H. Guo, “Copyright Protection Model of Embedded Systems and Its Applications in Digital TV SET-Top-Box,” 2008 International Symposium on Computational Intelligence and Design, Proposed a System Copyright Protection Model Based on Specific Crypto Memory IC, 2008.
[4] Y. Park, “Design and Performance Evalua-tion of Binary Code Packing for Protecting Embedded Software against Reverse Engineering,” 13th IEEE In-ternational Sympo- sium on Object /Component/Service-Oriented Real-Time Distributed Computing, 2010.
[5] Z. Y. Yang, “Software Protection Solutions for Embedded Systems,” Computer Applications and Software, Vol. 26, No. 8, 2009.