메뉴 건너뛰기




Volumn 3225, Issue , 2004, Pages 404-415

Detecting software theft via whole program path birthmarks

Author keywords

[No Author keywords available]

Indexed keywords

COPYRIGHTS; CRIME; SECURITY OF DATA;

EID: 35048854764     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30144-8_34     Document Type: Article
Times cited : (96)

References (27)
  • 2
    • 35048846840 scopus 로고    scopus 로고
    • Sandmark
    • Sandmark, http://www.cs.arizona.edu/sandmark/.
  • 4
    • 35048837838 scopus 로고    scopus 로고
    • Zelix klassmaster
    • Zelix klassmaster. http://www.zelix.com/klassmaster/index.html.
  • 6
    • 0032070303 scopus 로고    scopus 로고
    • On the limits of steganography
    • May Special issue on copyright & privacy protection
    • Ross J. Anderson and Fabien A. P. Petitcolas. On the limits of steganography. IEEE Journal of Selected Areas in Communications, 16(4):474-481, May 1998. Special issue on copyright & privacy protection.
    • (1998) IEEE Journal of Selected Areas in Communications , vol.16 , Issue.4 , pp. 474-481
    • Anderson, R.J.1    Petitcolas, F.A.P.2
  • 12
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Department of Computer Science, University of Auckland, July
    • Christian Collberg, Clark Thomborson, and Douglas Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997.
    • (1997) Technical Report 148
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 18
    • 0000523223 scopus 로고    scopus 로고
    • Compression and explanation using hierarchical grammars
    • C. G. Nevill-Manning and I. H. Witten. Compression and explanation using hierarchical grammars. The Computer Journal, 40(2/3), 1997.
    • (1997) The Computer Journal , vol.40 , Issue.2-3
    • Nevill-Manning, C.G.1    Witten, I.H.2
  • 20
    • 84947933018 scopus 로고    scopus 로고
    • Hiding signatures in graph coloring solutions
    • Gang Qu and Miodrag Potkonjak. Hiding signatures in graph coloring solutions. In Information Hiding, pages 348-367, 1999.
    • (1999) Information Hiding , pp. 348-367
    • Qu, G.1    Potkonjak, M.2
  • 22
    • 84947921326 scopus 로고    scopus 로고
    • Robust object watermarking: Application to code
    • Julien P. Stern, Gael Hachez, Francois Koeune, and Jean-Jacques Quisquater. Robust object watermarking: Application to code. In Information Hiding, pages 368-378, 1999. http://citeseer.nj.nec.com/stern00robust.html.
    • (1999) Information Hiding , pp. 368-378
    • Stern, J.P.1    Hachez, G.2    Koeune, F.3    Quisquater, J.-J.4
  • 26
    • 0025417991 scopus 로고
    • Identification of program similarity in large populations
    • Geoff Whale. Identification of program similarity in large populations. Computer Journal, 33:140-146, 1990.
    • (1990) Computer Journal , vol.33 , pp. 140-146
    • Whale, G.1
  • 27
    • 0026826629 scopus 로고
    • Detection of similarities in student programs: Yap'ing may be preferable to plague'ing
    • Micheal J. Wise. Detection of similarities in student programs: Yap'ing may be preferable to plague'ing. In 23rd SIGCSE Technical Symposium, pages 268-271, 1992.
    • (1992) 23rd SIGCSE Technical Symposium , pp. 268-271
    • Wise, M.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.