-
1
-
-
0004072686
-
-
Addison-Wesley, ISBN 0-201-10088-6.
-
Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman. Compilers, Principles, Techniques, and Tools. Addison-Wesley, 1986. ISBN 0-201-10088-6.
-
(1986)
Compilers, Principles, Techniques, and Tools.
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
6
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Department of Computer Science, University of Auckland, July
-
Christian Collberg, Clark Thomborson, and Douglas Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997. http://www.cs.auckland.ac.nz/ ~collberg/Research/Publications/CollbergThomborsonLow97a.
-
(1997)
Technical Report
, vol.148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
7
-
-
0031620963
-
Breaking abstractions and unstructuring data structures
-
Chicago, IL, May
-
Christian Collberg, Clark Thomborson, and Douglas Low. Breaking abstractions and unstructuring data structures. In IEEE International Conference on Computer Languages, ICCL'98, Chicago, IL, May 1998. http://www.cs.auckland. ac.nz/~collberg/Research/Publications/CollbergThomborsonLow98b/.
-
(1998)
IEEE International Conference on Computer Languages, ICCL'98
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
8
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs. in
-
POPL'98, San Diego, CA, January
-
Christian Collberg, Clark Thomborson, and Douglas Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Principles of Programming Languages 1998, POPL'98, San Diego, CA, January 1998. http://www.cs.auckland.ac. nz/~ collberg/Research/Publications/CollbergThomborsonLow98a/.
-
(1998)
Principles of Programming Languages 1998
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
11
-
-
0000162467
-
Compiler techniques for code compaction
-
March
-
Saumya Debray, William Evans, Robert Muth, and Bjorn De Sutter. Compiler techniques for code compaction. ACM Transactions on Programming Languages and Systems, 22(2):378-415, March 2000.
-
(2000)
ACM Transactions on Programming Languages and Systems
, vol.22
, Issue.2
, pp. 378-415
-
-
Debray, S.1
Evans, W.2
Muth, R.3
De Sutter, B.4
-
12
-
-
0035111361
-
ALTO: A link-time optimizer for the Compaq Alpha
-
January
-
Saumya Debray, Robert Muth, Scott Watterson, and Koen De Bosschere. ALTO: A link-time optimizer for the Compaq Alpha. Software -Practice and Experience, 31:67-101, January 2001.
-
(2001)
Software -Practice and Experience
, vol.31
, pp. 67-101
-
-
Debray, S.1
Muth, R.2
Watterson, S.3
De Bosschere, K.4
-
16
-
-
84949509764
-
Experience with software watermarking
-
Jens Palsberg, Sowmya Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, and Yi Zhang. Experience with software watermarking. In Proceedings of ACSAC '00, 16th Annual Computer Security Applications Conference, pages 308-316, 2000.
-
(2000)
Proceedings of ACSAC '00, 16th Annual Computer Security Applications Conference
, pp. 308-316
-
-
Palsberg, J.1
Krishnaswamy, S.2
Kwon, M.3
Di, M.4
Shao, Q.5
Zhang, Y.6
-
17
-
-
0032306157
-
Analysis of watermarking techniques for graph coloring problem
-
November
-
G. Qu and M. Potkonjak. Analysis of watermarking techniques for graph coloring problem. In IEEE/ACM International Conference on Computer Aided Design, pages 190-193, November 1998. http://www.cs.ucla.edu/~gangqu/publication/gc.ps. gz.
-
(1998)
IEEE/ACM International Conference on Computer Aided Design
, pp. 190-193
-
-
Qu, G.1
Potkonjak, M.2
-
18
-
-
0003602325
-
-
The Internet Engineering Task Force RFC 1321.
-
Ronald Rivest. The MD5 message-digest algorithm. http://www.ietf.org/rfc/ rfc1321.txt, 1992. The Internet Engineering Task Force RFC 1321.
-
(1992)
The MD5 Message-digest Algorithm.
-
-
Rivest, R.1
-
20
-
-
84947921326
-
Robust object watermarking: Application to code. in
-
Julien P. Stern, Gael Hachez, Francois Koeune, and Jean-Jacques Quisquater. Robust object watermarking: Application to code. In Information Hiding, pages 368-378, 1999.
-
(1999)
Information Hiding
, pp. 368-378
-
-
Stern, J.P.1
Hachez, G.2
Koeune, F.3
Quisquater, J.-J.4
-
21
-
-
4544234052
-
A graph theoretic approach to software watermarking
-
Pittsburgh, PA, April
-
Ramarathnam Venkatesan, Vijay Vazirani, and Saurabh Sinha. A graph theoretic approach to software watermarking. In 4th International Information Hiding Workshop, Pittsburgh, PA, April 2001.
-
(2001)
4th International Information Hiding Workshop
-
-
Venkatesan, R.1
Vazirani, V.2
Sinha, S.3
|