메뉴 건너뛰기




Volumn 4846 LNCS, Issue , 2007, Pages 2-16

A static birthmark of binary executables based on API call structure

Author keywords

Binary analysis; Software birthmark; Software piracy

Indexed keywords

COMPUTER CRIME; COMPUTER SOFTWARE; FUNCTION EVALUATION; GRAPH THEORY;

EID: 38348998898     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-76929-3_2     Document Type: Conference Paper
Times cited : (28)

References (24)
  • 4
    • 38349038867 scopus 로고    scopus 로고
    • SABRE BinDiff, http://www.Babre-security.com/products/bindiff.html
    • SABRE BinDiff
  • 5
    • 38349030058 scopus 로고    scopus 로고
    • Using BinDiff for Code theft detection
    • Using BinDiff for Code theft detection, http://www.sabre-security.com/ products/CodeTheft.pdf
  • 9
    • 0036704573 scopus 로고    scopus 로고
    • Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation-tools for software protection. Software Engineering, IEEE Transactions on 28(8), 735-746 (2002)
    • Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation-tools for software protection. Software Engineering, IEEE Transactions on 28(8), 735-746 (2002)
  • 11
    • 3042819306 scopus 로고    scopus 로고
    • Sandmark-A tool for software protection research
    • IEEE
    • Collberg, C., Myles, G., Huntwork, A.: Sandmark-A tool for software protection research. Security & Privacy Magazine, IEEE 1(4), 40-49 (2003)
    • (2003) Security & Privacy Magazine , vol.1 , Issue.4 , pp. 40-49
    • Collberg, C.1    Myles, G.2    Huntwork, A.3
  • 15
    • 35048854764 scopus 로고    scopus 로고
    • Detecting software theft via whole program path birth-marks
    • Myles, G., Collberg, C.: Detecting software theft via whole program path birth-marks. Information Security Conference, 404-415 (2004)
    • (2004) Information Security Conference , pp. 404-415
    • Myles, G.1    Collberg, C.2
  • 16
    • 38349000249 scopus 로고    scopus 로고
    • Theft Detection Through Program Identification. PhD thesis, Department of Computer Science, The University of Arizona
    • MyIes, G.M.: Software Theft Detection Through Program Identification. PhD thesis, Department of Computer Science, The University of Arizona (2006)
    • (2006) Software
    • MyIes, G.M.1
  • 18
    • 0032024433 scopus 로고    scopus 로고
    • A graph distance metric based on the maximal common subgraph
    • Bunke, H., Shearer, K.: A graph distance metric based on the maximal common subgraph. Pattern Recognition Letters 19(3-4), 255-259 (1998)
    • (1998) Pattern Recognition Letters , vol.19 , Issue.3-4 , pp. 255-259
    • Bunke, H.1    Shearer, K.2
  • 20
    • 13144282754 scopus 로고    scopus 로고
    • The Hungarian method for the assignment problem
    • Kuhn, H.: The Hungarian method for the assignment problem. Naval Research Logistics 52(1), 7-21 (2005)
    • (2005) Naval Research Logistics , vol.52 , Issue.1 , pp. 7-21
    • Kuhn, H.1
  • 22
  • 23
    • 38349010094 scopus 로고    scopus 로고
    • Wang, C, A Security Architecture for Survivability Mechanisms. PhD thesis, University of Virginia
    • Wang, C.: A Security Architecture for Survivability Mechanisms. PhD thesis, University of Virginia


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.