-
2
-
-
3042819306
-
Sandmark - A tool for software protection research
-
Christian Collberg, Ginger Myles, and Andrew Huntwork. Sandmark - A tool for software protection research. IEEE Security & Privacy, 4(1):40-49, 2003.
-
(2003)
IEEE Security & Privacy
, vol.4
, Issue.1
, pp. 40-49
-
-
Collberg, C.1
Myles, G.2
Huntwork, A.3
-
3
-
-
26444471878
-
Lightweight defect localization for Java
-
In Andrew P. Black, editor, Proc. of 19th European Conf. on Object-Oriented Programming, Springer
-
Valentin Dallmeier, Christian Lindig, and Andreas Zeller. Lightweight defect localization for Java. In Andrew P. Black, editor, Proc. of 19th European Conf. on Object-Oriented Programming, number 3586 in LNCS, pages 528-550. Springer, 2005.
-
(2005)
LNCS
, vol.3586
, pp. 528-550
-
-
Dallmeier, V.1
Lindig, C.2
Zeller, A.3
-
5
-
-
0031258214
-
Computer immunology
-
Stephanie Forrest, Steven A. Hofmeyr, and Anil Somayaji. Computer immunology. Communications of the ACM, 40(10):88-96, 1997.
-
(1997)
Communications of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
6
-
-
0027808377
-
Interposition agents: Transparently interposing user code at the system interface
-
ACM Press
-
Michael B. Jones. Interposition agents: Transparently interposing user code at the system interface. In Proc. of the 14th ACM Symp. on Operating System Principles, pages 80-93. ACM Press, 1993.
-
(1993)
Proc. of the 14th ACM Symp. on Operating System Principles
, pp. 80-93
-
-
Jones, M.B.1
-
7
-
-
0034770139
-
Identifying similar code with program dependence graphs
-
Jens Krinke. Identifying similar code with program dependence graphs. Working Conf. on Reverse Engineering (WCRE), pages 301-309, 2001.
-
(2001)
Working Conf. on Reverse Engineering (WCRE)
, pp. 301-309
-
-
Krinke, J.1
-
8
-
-
77954010661
-
-
Jenny available on the internet. Student summer project 415.780, University of Auckland
-
Hongying (Jenny) Lai. A comparative survey of Java obfuscators available on the internet. Student summer project 415.780, University of Auckland, Computer Science Department, 2001. http: //www.cs.auckland.ac.nz/~cthombor/ Students/hlai/.
-
(2001)
A Comparative Survey of Java Obfuscators
-
-
Lai, H.1
-
10
-
-
85043988965
-
Finding similar files in a large file system
-
Usenix Association
-
Udi Manber. Finding similar files in a large file system. In Proc. of the USENIX Winter 1994 Technical Conf., pages 1-10. Usenix Association, 1994.
-
(1994)
Proc. of the USENIX Winter 1994 Technical Conf.
, pp. 1-10
-
-
Manber, U.1
-
12
-
-
35048854764
-
Detecting software theft via whole program path birthmarks
-
In Kan Zhang and Yuliang Zheng, editors, Proc. of the 7th Int. Conf. on Information Security, Springer
-
Ginger Myles and Christian S. Collberg. Detecting software theft via whole program path birthmarks. In Kan Zhang and Yuliang Zheng, editors, Proc. of the 7th Int. Conf. on Information Security, volume 3225 of LNCS, pages 404-415. Springer, 2004.
-
(2004)
LNCS
, vol.3225
, pp. 404-415
-
-
Myles, G.1
Collberg, C.S.2
-
13
-
-
33644528723
-
Collberg. K-gram based software birthmarks
-
In Hisham Haddad, Lorie M. Liebrock, Andrea Omicini, and Roger L. Wainwright, editors, ACM
-
Ginger Myles and Christian S. Collberg. K-gram based software birthmarks. In Hisham Haddad, Lorie M. Liebrock, Andrea Omicini, and Roger L. Wainwright, editors, Proc. of the 2005 ACM Symp. on Applied Computing, pages 314-318. ACM, 2005.
-
(2005)
Proc. of the 2005 ACM Symp. on Applied Computing
, pp. 314-318
-
-
Myles, G.1
Christian, S.2
-
15
-
-
24144458954
-
Purity and side effect analysis for Java programs
-
In Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation
-
Alexandru Salcianu and Martin Rinard. Purity and side effect analysis for Java programs. In Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation, number 3385 in LNCS, pages 199-215, 2005.
-
(2005)
LNCS
, vol.3385
, pp. 199-215
-
-
Salcianu, A.1
Rinard, M.2
-
17
-
-
77953975484
-
-
Standard Performance Evaluation Corporation
-
SPEC. SPEC JVM98 benchmark suite. Standard Performance Evaluation Corporation, 1998.
-
(1998)
SPEC. SPEC JVM98 Benchmark Suite
-
-
-
18
-
-
26444481301
-
Design and evaluation of birthmarks for detecting theft of Java programs
-
Innsbruck, Austria
-
Haruaki Tamada, Masahide Nakamura, Akito Monden, and Ken ichi Matsumoto. Design and evaluation of birthmarks for detecting theft of Java programs. In Proc. of the IASTED Int. Conf. on Software Engineering, pages 569-575, 2004. Innsbruck, Austria.
-
(2004)
Proc. of the IASTED Int. Conf. on Software Engineering
, pp. 569-575
-
-
Tamada, H.1
Nakamura, M.2
Monden, A.3
Matsumoto, K.I.4
-
19
-
-
38349021089
-
Dynamic software birthmarks to detect the theft of Windows applications
-
Haruaki Tamada, Keiji Okamoto, Masahide Nakamura, Akito Monden, and Ken-ichi Matsumoto. Dynamic software birthmarks to detect the theft of Windows applications. In Proc. Int. Symp. on Future Software Technology 2004, 2004.
-
Proc. Int. Symp. on Future Software Technology 2004, 2004
-
-
Tamada, H.1
Okamoto, K.2
Nakamura, M.3
Monden, A.4
Matsumoto, K.-I.5
-
20
-
-
77953966861
-
-
Willem van Schaik. PNG Suite, 1996. URL http://www.schaik.com/pngsuite/ pngsuite.html.
-
(1996)
PNG Suite
-
-
Van Schaik, W.1
|