Abstract | ||
---|---|---|
Compiled code, including compiled Python code, can be supplied to students in ways that make it usable, yet protected. Protection may be applied to limit code to running in a certain place, make reverse engineering challenging, and even present difficulties running automated analysis tools. I present my experience with three code protection methods that I have used in my classes. |
Year | Venue | Field |
---|---|---|
2016 | WCCCE | USable,Software engineering,Computer science,Source code,Reverse engineering,Redundant code,Compiled language,Abstinence,Obfuscation (software),Python (programming language) |
DocType | Citations | PageRank |
Conference | 2 | 0.49 |
References | Authors | |
2 | 1 |
Name | Order | Citations | PageRank |
---|---|---|---|
John Aycock | 1 | 351 | 33.03 |