메뉴 건너뛰기




Volumn , Issue , 2006, Pages

On approximate matching of programs for protecting libre software

Author keywords

[No Author keywords available]

Indexed keywords

APPROXIMATE MATCHING; CODE PROGRAMS; COMMERCIAL GRADE; CONTROL FLOWS; DISTANCE FUNCTIONS; LIBRE SOFTWARE; OPEN SOURCE DEVELOPMENT; OPEN SOURCES; RAPID IDENTIFICATION;

EID: 77952410052     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1188966.1188994     Document Type: Conference Paper
Times cited : (5)

References (28)
  • 1
    • 77952330076 scopus 로고    scopus 로고
    • http://jmusic.ci.qut.edu.au/.
  • 2
    • 77952358578 scopus 로고    scopus 로고
    • http://q-lang.sourceforge.net.
  • 3
    • 77952399006 scopus 로고    scopus 로고
    • http://www.fsf.org/
  • 4
    • 77952369912 scopus 로고    scopus 로고
    • http://gpl-violations.org/
    • http://www.fsf.org/licensing/licenses/ and http://gpl-violations.org/.
  • 5
    • 77952384565 scopus 로고    scopus 로고
    • http://www.gnu.org/software/binutils/.
  • 6
    • 77952367927 scopus 로고    scopus 로고
    • http://www.leesw.com/smokescreen/.
  • 7
    • 77952400001 scopus 로고    scopus 로고
    • http://www.zelix.com.
  • 10
    • 0032311601 scopus 로고    scopus 로고
    • Clone detection using abstract syntax trees
    • Ira D. Baxter, Andrew Yahin, Leonardo M. De Moura, Marcelo Sant'Anna, and Lorraine Bier. Clone detection using abstract syntax trees. In ICSM, pages 368-377, 1998.
    • (1998) ICSM , pp. 368-377
    • Ira, D.B.1    Yahin, A.2    De Moura, L.M.3    Sant'Anna, M.4    Bier, L.5
  • 12
    • 84924223669 scopus 로고    scopus 로고
    • Static analysis of executables to detect malicious patterns
    • M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. 12th USENIX Security Symposium, pages 169-186, 2003.
    • (2003) 12th USENIX Security Symposium , pp. 169-186
    • Christodorescu, M.1    Jha, S.2
  • 14
    • 0031649930 scopus 로고    scopus 로고
    • Manufacturing cheap, resilient, and stealthy opaque constructs. in Principles of Programming Languages 1998
    • Christian Collberg, Clark Thomborson, and Douglas Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Principles of Programming Languages 1998, POPL'98, pages 184-196, 1998.
    • (1998) POPL'98 , pp. 184-196
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 17
    • 0004253669 scopus 로고    scopus 로고
    • Prentice Hall PTR, Upper Saddle River, NJ, USA
    • Edsger Wybe Dijkstra. A Discipline of Programming. Prentice Hall PTR, Upper Saddle River, NJ, USA, 1997.
    • (1997) A Discipline of Programming
    • Edsger, W.D.1
  • 22
    • 84890052317 scopus 로고    scopus 로고
    • Using slicing to identify duplication in source code
    • Raghavan Komondoor and Susan Horwitz. Using slicing to identify duplication in source code. Lecture Notes in Computer Science, 2126:40-60, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2126 , pp. 40-60
    • Komondoor, R.1    Horwitz, S.2
  • 24
    • 0027029758 scopus 로고
    • Undecidability of static analysis
    • William Landi. Undecidability of static analysis. ACM Lett. Program. Lang. Syst., 1(4):323-337, 1992.
    • (1992) ACM Lett. Program. Lang. Syst. , vol.1 , Issue.4 , pp. 323-337
    • Landi, W.1
  • 25
    • 0006604914 scopus 로고    scopus 로고
    • PhD thesis, University of Auckland, Auckland, New Zealand
    • Douglas Low. Java Control Flow Obfuscation. PhD thesis, University of Auckland, Auckland, New Zealand, 1998.
    • (1998) Java Control Flow Obfuscation
    • Low, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.