-
1
-
-
33645755129
-
-
Business software alliance
-
Business software alliance, http://www.bsa.org.
-
-
-
-
2
-
-
33645772134
-
-
Sandmark
-
Sandmark. http://www.cs.arizona.edu/sandmark/.
-
-
-
-
3
-
-
33645768929
-
-
Specjvm98 v1.04
-
Specjvm98 v1.04. http://www.specbench.org/osg/jvm98/.
-
-
-
-
4
-
-
0004072686
-
-
Addison-Wesley
-
Aho, A. V., Sethi, R., & Ullman, J. D. (1988). Compilers: Principles, Techniques, and Tools. Addison-Wesley.
-
(1988)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
6
-
-
4544343865
-
Graph theoretic software watermarks: Implementation, analysis, and attacks
-
Collberg, C., Huntwork, A., Carter, E., & Townsend, G. (2004). Graph theoretic software watermarks: Implementation, analysis, and attacks. In 6th International Information Hiding Workshop.
-
(2004)
6th International Information Hiding Workshop
-
-
Collberg, C.1
Huntwork, A.2
Carter, E.3
Townsend, G.4
-
7
-
-
3042819306
-
Sandmark - A tool for software protection research
-
Collberg, C., Myles, G., & Huntwork, A. (2003). Sandmark - a tool for software protection research. IEEE Security and Privacy, 1 (4), 40-49.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 40-49
-
-
Collberg, C.1
Myles, G.2
Huntwork, A.3
-
9
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
San Diego, CA
-
Collberg, C., Thomborson, C., & Low, D. (1998). Manufacturing cheap, resilient, and stealthy opaque constructs. In Principles of Programming Languages 1998, POPL'98, San Diego, CA.
-
(1998)
Principles of Programming Languages 1998, POPL'98
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
10
-
-
8344263880
-
Dynamic path-based software watermarking
-
Christian Collberg, Edward Carter, Saumya Debray, Andrew Huntwork, Cullen Linn, & Mike Stepp. (2004). Dynamic path-based software watermarking. In SIG-PLAN '04 Conference on Programming Language Design and Implementation.
-
(2004)
SIG-PLAN '04 Conference on Programming Language Design and Implementation
-
-
Collberg, C.1
Carter, E.2
Debray, S.3
Huntwork, A.4
Linn, C.5
Stepp, M.6
-
12
-
-
33645785768
-
Method and system for generating and auditing a signature for a computer program
-
Assignee: Microsoft Corporation
-
Davidson. R. L., & Myhrvold, N. (1996). Method and system for generating and auditing a signature for a computer program. US Patent 5,559,884, Assignee: Microsoft Corporation.
-
(1996)
US Patent 5,559,884
-
-
Davidson, R.L.1
Myhrvold, N.2
-
14
-
-
0037993169
-
Watermarking java programs
-
Monden, A., Hajimu, I., Matsumoto, K., Katsuro, I., & Torii, K. (1999). Watermarking java programs. In Proceedings of International Symposium on Future Software Technology.
-
(1999)
Proceedings of International Symposium on Future Software Technology
-
-
Monden, A.1
Hajimu, I.2
Matsumoto, K.3
Katsuro, I.4
Torii, K.5
-
15
-
-
0034504466
-
A practical method for watermarking java programs
-
Monden, A., Iida, H., Matsumoto, K., Inoue, K., & Torii, K. (2000). A practical method for watermarking java programs. In compsac2000, 24th Computer Software and Applications Conference.
-
(2000)
Compsac2000, 24th Computer Software and Applications Conference
-
-
Monden, A.1
Iida, H.2
Matsumoto, K.3
Inoue, K.4
Torii, K.5
-
18
-
-
24944582622
-
A functional taxonomy for software watermarking
-
Michael J. Oudshoorn, editor, Conferences in Research and Practice in Information Technology, Melbourne, Australia, ACS
-
Nagra, J., Thomborson, C., & Collberg, C. (2002). A functional taxonomy for software watermarking. In Michael J. Oudshoorn, editor, Twenty-Fifth Australasian Computer Science Conference (ACSC2002), Conferences in Research and Practice in Information Technology, Melbourne, Australia, ACS.
-
(2002)
Twenty-Fifth Australasian Computer Science Conference (ACSC2002)
-
-
Nagra, J.1
Thomborson, C.2
Collberg, C.3
-
19
-
-
84949509764
-
Experience with software watermarking
-
Palsberg, J., Krishnaswamy, S., Kwon, M., Ma, D., Shao, Q., & Zhang, Y. (2000). Experience with software watermarking. In Proceedings of ACSAC'00, 16th Annual Computer Security Applications Conference, pp. 308-316.
-
(2000)
Proceedings of ACSAC'00, 16th Annual Computer Security Applications Conference
, pp. 308-316
-
-
Palsberg, J.1
Krishnaswamy, S.2
Kwon, M.3
Ma, D.4
Shao, Q.5
Zhang, Y.6
-
21
-
-
24944463028
-
Software watermarking in the frequency domain: Implementation, analysis, and attacks
-
Technical Report TR04-07, Department of Computer Science, University of Arizona
-
Sahoo, T. R., & Collberg, C. (2004). Software watermarking in the frequency domain: Implementation, analysis, and attacks. Technical Report TR04-07, Department of Computer Science, University of Arizona.
-
(2004)
-
-
Sahoo, T.R.1
Collberg, C.2
-
22
-
-
33645798264
-
-
Pendragon Software. Caffeinemark 3.0
-
Pendragon Software. Caffeinemark 3.0. (1998). http://www.pendragon-software.com/pendragon/cm3/.
-
(1998)
-
-
-
23
-
-
84947921326
-
Robust object watermarking: Application to code
-
Stern, J. P., Hachez, G., Koeune, F., & Quisquater, J. (1999). Robust object watermarking: Application to code. In International Information Hiding Workshop, pp. 368-378.
-
(1999)
International Information Hiding Workshop
, pp. 368-378
-
-
Stern, J.P.1
Hachez, G.2
Koeune, F.3
Quisquater, J.4
-
24
-
-
0000990322
-
A survey of program slicing techniques
-
Tip, F. (1995). A survey of program slicing techniques. Journal of programming languages 3, 121-189.
-
(1995)
Journal of Programming Languages
, vol.3
, pp. 121-189
-
-
Tip, F.1
-
25
-
-
4544234052
-
A graph theoretic approach to software watermarking
-
Pittsburgh, PA
-
Venkatesan, R., Vazirani, V., & Sinha, S. (2001). A graph theoretic approach to software watermarking. In 4th International Information Hiding Workshop, Pittsburgh, PA.
-
(2001)
4th International Information Hiding Workshop
-
-
Venkatesan, R.1
Vazirani, V.2
Sinha, S.3
|