메뉴 건너뛰기




Volumn 6, Issue 2, 2006, Pages 155-171

Software watermarking via opaque predicates: Implementation, analysis, and attacks

Author keywords

Copyright protection; Opaque predicate; Software piracy; Software watermarking

Indexed keywords

COMPUTER CRIME; COMPUTER SOFTWARE; DIGITAL WATERMARKING;

EID: 33645758539     PISSN: 13895753     EISSN: 15729362     Source Type: Journal    
DOI: 10.1007/s10660-006-6955-z     Document Type: Article
Times cited : (51)

References (25)
  • 1
    • 33645755129 scopus 로고    scopus 로고
    • Business software alliance
    • Business software alliance, http://www.bsa.org.
  • 2
    • 33645772134 scopus 로고    scopus 로고
    • Sandmark
    • Sandmark. http://www.cs.arizona.edu/sandmark/.
  • 3
    • 33645768929 scopus 로고    scopus 로고
    • Specjvm98 v1.04
    • Specjvm98 v1.04. http://www.specbench.org/osg/jvm98/.
  • 7
    • 3042819306 scopus 로고    scopus 로고
    • Sandmark - A tool for software protection research
    • Collberg, C., Myles, G., & Huntwork, A. (2003). Sandmark - a tool for software protection research. IEEE Security and Privacy, 1 (4), 40-49.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.4 , pp. 40-49
    • Collberg, C.1    Myles, G.2    Huntwork, A.3
  • 11
  • 12
    • 33645785768 scopus 로고    scopus 로고
    • Method and system for generating and auditing a signature for a computer program
    • Assignee: Microsoft Corporation
    • Davidson. R. L., & Myhrvold, N. (1996). Method and system for generating and auditing a signature for a computer program. US Patent 5,559,884, Assignee: Microsoft Corporation.
    • (1996) US Patent 5,559,884
    • Davidson, R.L.1    Myhrvold, N.2
  • 18
    • 24944582622 scopus 로고    scopus 로고
    • A functional taxonomy for software watermarking
    • Michael J. Oudshoorn, editor, Conferences in Research and Practice in Information Technology, Melbourne, Australia, ACS
    • Nagra, J., Thomborson, C., & Collberg, C. (2002). A functional taxonomy for software watermarking. In Michael J. Oudshoorn, editor, Twenty-Fifth Australasian Computer Science Conference (ACSC2002), Conferences in Research and Practice in Information Technology, Melbourne, Australia, ACS.
    • (2002) Twenty-Fifth Australasian Computer Science Conference (ACSC2002)
    • Nagra, J.1    Thomborson, C.2    Collberg, C.3
  • 21
    • 24944463028 scopus 로고    scopus 로고
    • Software watermarking in the frequency domain: Implementation, analysis, and attacks
    • Technical Report TR04-07, Department of Computer Science, University of Arizona
    • Sahoo, T. R., & Collberg, C. (2004). Software watermarking in the frequency domain: Implementation, analysis, and attacks. Technical Report TR04-07, Department of Computer Science, University of Arizona.
    • (2004)
    • Sahoo, T.R.1    Collberg, C.2
  • 22
    • 33645798264 scopus 로고    scopus 로고
    • Pendragon Software. Caffeinemark 3.0
    • Pendragon Software. Caffeinemark 3.0. (1998). http://www.pendragon-software.com/pendragon/cm3/.
    • (1998)
  • 24
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • Tip, F. (1995). A survey of program slicing techniques. Journal of programming languages 3, 121-189.
    • (1995) Journal of Programming Languages , vol.3 , pp. 121-189
    • Tip, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.