-
1
-
-
77952330076
-
-
http://jmusic.ci.qut.edu.au/.
-
-
-
-
2
-
-
77952358578
-
-
http://q-lang.sourceforge.net.
-
-
-
-
3
-
-
77952399006
-
-
http://www.fsf.org/
-
-
-
-
4
-
-
77952369912
-
-
http://gpl-violations.org/
-
http://www.fsf.org/licensing/licenses/ and http://gpl-violations.org/.
-
-
-
-
5
-
-
77952384565
-
-
http://www.gnu.org/software/binutils/.
-
-
-
-
6
-
-
77952367927
-
-
http://www.leesw.com/smokescreen/.
-
-
-
-
7
-
-
77952400001
-
-
http://www.zelix.com.
-
-
-
-
9
-
-
0011188089
-
On the (im)possibility of obfuscating programs
-
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology-CRYPTO, 2001.
-
(2001)
Advances in Cryptology-CRYPTO
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
10
-
-
0032311601
-
Clone detection using abstract syntax trees
-
Ira D. Baxter, Andrew Yahin, Leonardo M. De Moura, Marcelo Sant'Anna, and Lorraine Bier. Clone detection using abstract syntax trees. In ICSM, pages 368-377, 1998.
-
(1998)
ICSM
, pp. 368-377
-
-
Ira, D.B.1
Yahin, A.2
De Moura, L.M.3
Sant'Anna, M.4
Bier, L.5
-
12
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. 12th USENIX Security Symposium, pages 169-186, 2003.
-
(2003)
12th USENIX Security Symposium
, pp. 169-186
-
-
Christodorescu, M.1
Jha, S.2
-
14
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs. in Principles of Programming Languages 1998
-
Christian Collberg, Clark Thomborson, and Douglas Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Principles of Programming Languages 1998, POPL'98, pages 184-196, 1998.
-
(1998)
POPL'98
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
17
-
-
0004253669
-
-
Prentice Hall PTR, Upper Saddle River, NJ, USA
-
Edsger Wybe Dijkstra. A Discipline of Programming. Prentice Hall PTR, Upper Saddle River, NJ, USA, 1997.
-
(1997)
A Discipline of Programming
-
-
Edsger, W.D.1
-
22
-
-
84890052317
-
Using slicing to identify duplication in source code
-
Raghavan Komondoor and Susan Horwitz. Using slicing to identify duplication in source code. Lecture Notes in Computer Science, 2126:40-60, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2126
, pp. 40-60
-
-
Komondoor, R.1
Horwitz, S.2
-
24
-
-
0027029758
-
Undecidability of static analysis
-
William Landi. Undecidability of static analysis. ACM Lett. Program. Lang. Syst., 1(4):323-337, 1992.
-
(1992)
ACM Lett. Program. Lang. Syst.
, vol.1
, Issue.4
, pp. 323-337
-
-
Landi, W.1
-
25
-
-
0006604914
-
-
PhD thesis, University of Auckland, Auckland, New Zealand
-
Douglas Low. Java Control Flow Obfuscation. PhD thesis, University of Auckland, Auckland, New Zealand, 1998.
-
(1998)
Java Control Flow Obfuscation
-
-
Low, D.1
-
27
-
-
0034504466
-
A practical method for watermarking java programs
-
A. Monden, H. Iida, K. Matsumoto, Katsuro Inoue, and Koji Torii. A practical method for watermarking java programs. In compsac2000, 24th Computer Software and Applications Conference, 2000.
-
(2000)
Compsac2000, 24th Computer Software and Applications Conference
-
-
Monden, A.1
Iida, H.2
Matsumoto, K.3
Inoue, K.4
Torii, K.5
-
28
-
-
84987187338
-
Myers. A precise interprocedural data flow algorithm
-
New York, NY, USA, ACM
-
Eugene M. Myers. A precise interprocedural data flow algorithm. In POPL '81: Proceedings of the 8th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 219-230, New York, NY, USA, 1981. ACM
-
(1981)
POPL ' 81: Proceedings of the 8th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 219-230
-
-
Eugene, M.1
|