-
2
-
-
8344263880
-
Dynamic path-based software watermarking
-
C. Collberg, E. Carter, S. Debray, A. Huntwork, C. Linn, and M. Stepp, "Dynamic path-based software watermarking," in Proceedings of the Conference on Programming Language Design and Implementation, 2004.
-
Proceedings of the Conference on Programming Language Design and Implementation, 2004
-
-
Collberg, C.1
Carter, E.2
Debray, S.3
Huntwork, A.4
Linn, C.5
Stepp, M.6
-
3
-
-
26444481301
-
Design and evaluation of birthmarks for detecting theft of java programs
-
H. Tamada, M. Nakamura, A. Monden, and K. ichi Matsumoto, "Design and evaluation of birthmarks for detecting theft of java programs," in Proc. IASTED International Conference on Software Engineering, 2004.
-
Proc. IASTED International Conference on Software Engineering, 2004
-
-
Tamada, H.1
Nakamura, M.2
Monden, A.3
Matsumoto, K.I.4
-
5
-
-
35048854764
-
Detecting software theft via whole program path birthmarks
-
G. Myles and C. Collberg, "Detecting software theft via whole program path birthmarks," in ISC, 2004, pp. 404-415.
-
(2004)
ISC
, pp. 404-415
-
-
Myles, G.1
Collberg, C.2
-
6
-
-
38349021089
-
Dynamic software birthmarks to detect the theft of windows applications
-
H. Tamada, K. Okamoto, M. Nakamura, and A. Monden, "Dynamic software birthmarks to detect the theft of windows applications," in International Symposium on Future Software Technology 2004 (ISFST 2004), 2004.
-
International Symposium on Future Software Technology 2004 (ISFST 2004), 2004
-
-
Tamada, H.1
Okamoto, K.2
Nakamura, M.3
Monden, A.4
-
7
-
-
0004046658
-
-
The Univeristy of Auckland, Tech. Rep. 148, Jul.
-
C. Collberg, C. Thomborson, and D. Low, "A taxonomy of obfuscating transformations," The Univeristy of Auckland, Tech. Rep. 148, Jul. 1997.
-
(1997)
A Taxonomy of Obfuscating Transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
8
-
-
77950832022
-
K-gram based software birthmarks
-
G. Myles and C. S. Collberg, "K-gram based software birthmarks," in SAC, 2005.
-
(2005)
SAC
-
-
Myles, G.1
Collberg, C.S.2
-
9
-
-
85077680022
-
Behavior-based spyware detection
-
E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. A. Kemmerer, "Behavior-based spyware detection," in Proceedings of the 15th conference on USENIX Security Symposium, 2006.
-
Proceedings of the 15th Conference on USENIX Security Symposium, 2006
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.A.5
-
11
-
-
77950819730
-
-
"Gecko," http://en.wikipedia.org/wiki/Gecko-layout-engine.
-
Gecko
-
-
-
12
-
-
77950828191
-
-
"KHTML," http://en.wikipedia.org/wiki/KHTML.
-
KHTML
-
-
-
13
-
-
3042819306
-
Sandmark - A tool for software protection research
-
C. Collberg, G. Myles, and A. Huntwork, "Sandmark - a tool for software protection research," IEEE Security and Privacy, vol.1, no. 4, pp. 40-49, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 40-49
-
-
Collberg, C.1
Myles, G.2
Huntwork, A.3
-
14
-
-
0029716418
-
A sense of self for Unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for Unix processes," in Proceedinges of the 1996 IEEE Symposium on Research in Security and Privacy, 1996.
-
Proceedinges of the 1996 IEEE Symposium on Research in Security and Privacy, 1996
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
17
-
-
74049163233
-
Behavior based software theft detection
-
X. Wang, Y.-C. Jhi, S. Zhu, and P. Liu, "Behavior based software theft detection," in Proc. of the 16th ACM Conference on Computer and Communications Security (CCS'09), 2009.
-
Proc. of the 16th ACM Conference on Computer and Communications Security (CCS'09), 2009
-
-
Wang, X.1
Jhi, Y.-C.2
Zhu, S.3
Liu, P.4
-
18
-
-
74049126356
-
-
Nara Institute of Science and Technology, Technical Report
-
H. Tamada, K. Okamoto, M. Nakamura, A. Monden, and K. ichi Matsumoto, "Design and evaluation of dynamic software birthmarks based on api calls," Nara Institute of Science and Technology, Technical Report, 2007.
-
(2007)
Design and Evaluation of Dynamic Software Birthmarks Based on Api Calls
-
-
Tamada, H.1
Okamoto, K.2
Nakamura, M.3
Monden, A.4
Matsumoto, K.I.5
-
20
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier, "Clone detection using abstract syntax trees." in Int. Conf. on Software Maintenance, 1998.
-
Int. Conf. on Software Maintenance, 1998
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
22
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue., "CCFinder: a multilinguistic token-based code clone detection system for large scale source code." IEEE Trans. Softw. Eng., vol. 28, no. 7, 2002.
-
(2002)
IEEE Trans. Softw. Eng.
, vol.28
, Issue.7
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
25
-
-
33749559863
-
Gplag: Detection of software plagiarism by program dependence graph analysis
-
C. Liu, C. Chen, J. Han, and P. S. Yu, "Gplag: detection of software plagiarism by program dependence graph analysis," in Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, 2006.
-
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006
-
-
Liu, C.1
Chen, C.2
Han, J.3
Yu, P.S.4
|