-
1
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation - Tools for software protection
-
C.S. Collberg and C. Thomborson, "Watermarking, Tamper-proofing, and Obfuscation - Tools for Software Protection," IEEE Trans. Software Eng., vol. 28, no. 8, 2002, pp. 735-746.
-
(2002)
IEEE Trans. Software Eng.
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.S.1
Thomborson, C.2
-
2
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Dept. of Computer Science, University of Auckland, New Zealand
-
C. Collberg, C. Thomborson, and D. Low, A Taxonomy of Obfuscating Transformations, tech. report 148, Dept. of Computer Science, University of Auckland, New Zealand, 1997; www.cs.arizona.edu/~collberg/Research/Publications/ CollbergThomborsonLow97a/.
-
(1997)
Tech. Report
, vol.148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
3
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
ACM Press
-
C. Collberg, C. Thomborson, and D. Low, "Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs, Proc. 25th ACM SIGPLAN-SIGACT Symp. Principles of Programming Languages (POPL 98), ACM Press, 1998; www.cs.arizona.edu/~collberg/Research/Publications/CollbergThomborsonLow98a/.
-
(1998)
Proc. 25th ACM SIGPLAN-SIGACT Symp. Principles of Programming Languages (POPL 98)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
5
-
-
84947921326
-
Robust object watermarking: Application to code
-
1999, LNCS 1768, A. Pfitzman, ed., Springer-Verlag, 2000
-
J.P. Stern et al., "Robust Object Watermarking: Application to Code," Information Hiding, 1999, LNCS 1768, A. Pfitzman, ed., Springer-Verlag, 2000, pp. 368-378.
-
(2000)
Information Hiding
, pp. 368-378
-
-
Stern, J.P.1
-
6
-
-
84947285817
-
A graph theoretic approach to software watermarking
-
LNCS 2137, J.S. Moskowitz, ed., Springer Verlag
-
R. Venkatesan, V. Vazirani, and S. Sinha, "A Graph Theoretic Approach to Software Watermarking," Proc. 4th Int'l Info. Hiding Workshop, LNCS 2137, J.S. Moskowitz, ed., Springer Verlag, 2001. pp. 157-168.
-
(2001)
Proc. 4th Int'l Info. Hiding Workshop
, pp. 157-168
-
-
Venkatesan, R.1
Vazirani, V.2
Sinha, S.3
-
8
-
-
84947933018
-
Hiding signatures in graph coloring solutions
-
LNCS 1768, A. Pfitzma, ed., Springer-Verlag
-
G. Qu and M. Potkonjak, "Hiding Signatures in Graph Coloring Solutions," Information Hiding, LNCS 1768, A. Pfitzma, ed., Springer-Verlag, 2000, pp. 348-367.
-
(2000)
Information Hiding
, pp. 348-367
-
-
Qu, G.1
Potkonjak, M.2
-
9
-
-
0012096121
-
-
US Patent 5,559,884, to Microsoft
-
R.L. Davidson and N. Myhrvold, Method and System for Generating and Auditing a Signature for a Computer Program, US Patent 5,559,884, to Microsoft, 1996.
-
(1996)
Method and System for Generating and Auditing a Signature for a Computer Program
-
-
Davidson, R.L.1
Myhrvold, N.2
-
10
-
-
0032306157
-
Analysis of watermarking techniques for graph coloring problem
-
G. Qu and M. Potkonjak, "Analysis of Watermarking Techniques for Graph Coloring Problem," IEEE/ACM Int'l Conf. Computer Aided Design, 1998, pp. 190-193; www.cs.ucla.edu/~gangqu/publication/gc.ps.gz.
-
(1998)
IEEE/ACM Int'l Conf. Computer Aided Design
, pp. 190-193
-
-
Qu, G.1
Potkonjak, M.2
-
11
-
-
0012064474
-
-
US patent 5,892,899, to Intel Corp.
-
D. Aucsmith and G. Graunke, Tamper Resistant Methods and Apparatus, US patent 5,892,899, to Intel Corp., 1999.
-
(1999)
Tamper Resistant Methods and Apparatus
-
-
Aucsmith, D.1
Graunke, G.2
-
13
-
-
0017291489
-
A complexity measure
-
T.J. McCabe, "A Complexity Measure," IEEE Trans. Software Eng., vol. 2, no. 4, 1976, pp. 308-320.
-
(1976)
IEEE Trans. Software Eng.
, vol.2
, Issue.4
, pp. 308-320
-
-
McCabe, T.J.1
-
15
-
-
0027554366
-
Measurement of data structure complexity
-
J.C. Munson and T.M. Kohshgoftaar, "Measurement of Data Structure Complexity," J. Systems Software, vol. 20, no. 217, 1993, p. 225.
-
(1993)
J. Systems Software
, vol.20
, Issue.217
, pp. 225
-
-
Munson, J.C.1
Kohshgoftaar, T.M.2
-
16
-
-
0028446078
-
A metrics suite for object-oriented design
-
S.R. Chidamber and C.F. Kemerer, "A Metrics Suite for Object-Oriented Design," IEEE Trans. Software Eng., vol. 20, no. 6, 1994, pp. 476-493.
-
(1994)
IEEE Trans. Software Eng.
, vol.20
, Issue.6
, pp. 476-493
-
-
Chidamber, S.R.1
Kemerer, C.F.2
-
17
-
-
0019613747
-
Software structure metrics based on information flow
-
S. Henry and D. Kafura, "Software Structure Metrics Based on Information Flow," IEEE Trans. Software Eng., vol. 7, no. 5, 1981, pp. 510-518.
-
(1981)
IEEE Trans. Software Eng.
, vol.7
, Issue.5
, pp. 510-518
-
-
Henry, S.1
Kafura, D.2
-
18
-
-
84976759457
-
A complexity measure based on nesting level
-
W.A. Harrison and K.I. Magel, "A Complexity Measure Based on Nesting Level," SIGPLAN Notices, vol. 16, no. 3, 1981, pp. 63-74.
-
(1981)
SIGPLAN Notices
, vol.16
, Issue.3
, pp. 63-74
-
-
Harrison, W.A.1
Magel, K.I.2
-
19
-
-
84959058990
-
Protecting software code by guards
-
LNCS 2320, T. Sander, ed., Security and Privacy in Digital Rights Management
-
H. Chang and M. Atallah, "Protecting Software Code by Guards," Workshop on Security and Privacy in Digital Rights Management 2002. LNCS 2320, T. Sander, ed., Security and Privacy in Digital Rights Management, 2002, pp. 160-175.
-
(2002)
Workshop on Security and Privacy in Digital Rights Management 2002
, pp. 160-175
-
-
Chang, H.1
Atallah, M.2
|