Stelvio Cimato, Antonio De Santis, Umberto Ferraro Petrillo, ``Overcoming the obfuscation of Java programs by identifier renaming,'' Journal of Systems and Software, Volume. 78, Issues. 1, pp.60--72, October 2005.
Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken-ichi Matsumoto, ``Introducing Dynamic Name Resolution Mechanism for Obfuscating System-Defined Names in Programs,'' In Proc. IASTED International Conference on Software Engineering (IASTED SE 2008), 598-074, pp. 125--130, 12-14 February 2008 (Innsbruck, Austria).
Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya Debray, Bjorn De Sutter, Koen De Bosschere, ``Software Protection through Dynamic Code Mutation,'' In Proc. International Workshop on Information Security Applications 2005 (WISA 2005), pp.371--385, August 2005.
Christian Collberg, Clark Thomborson, Douglas Low, ``Breaking Abstractions and Unstructuring Data Structures,'' In Proc. 1998 International Conference on Computer Languages, pp. 28--38, October 1998.
Christian Collberg, Clark Thomborson, Douglas Low, ``Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs,'' In Proc. Principles of Programming Languages 1998, POPL'98, pp.184--196, January 1998.
Stephan Drape, Anirban Majumdar, Clark Thomborson, ``Slicing Aided Design of Obfuscating Transformes,'' In Proc. 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007.
Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji, ``Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents,'' In Proc. 7th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, CMS 2003, Volume. 2828 of Lecture Notes in Computer Science, pp. 89--103, October 2003.