메뉴 건너뛰기




Volumn , Issue , 2007, Pages 274-282

A dynamic birthmark for Java

Author keywords

birthmarking

Indexed keywords

BEFORE AND AFTER; BIRTHMARKING; CORE ASSET; INTRINSIC PROPERTY; TAMPER-RESISTANT; XML PARSER;

EID: 77953978582     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1321631.1321672     Document Type: Conference Paper
Times cited : (91)

References (20)
  • 2
    • 3042819306 scopus 로고    scopus 로고
    • Sandmark - A tool for software protection research
    • Christian Collberg, Ginger Myles, and Andrew Huntwork. Sandmark - A tool for software protection research. IEEE Security & Privacy, 4(1):40-49, 2003.
    • (2003) IEEE Security & Privacy , vol.4 , Issue.1 , pp. 40-49
    • Collberg, C.1    Myles, G.2    Huntwork, A.3
  • 3
    • 26444471878 scopus 로고    scopus 로고
    • Lightweight defect localization for Java
    • In Andrew P. Black, editor, Proc. of 19th European Conf. on Object-Oriented Programming, Springer
    • Valentin Dallmeier, Christian Lindig, and Andreas Zeller. Lightweight defect localization for Java. In Andrew P. Black, editor, Proc. of 19th European Conf. on Object-Oriented Programming, number 3586 in LNCS, pages 528-550. Springer, 2005.
    • (2005) LNCS , vol.3586 , pp. 528-550
    • Dallmeier, V.1    Lindig, C.2    Zeller, A.3
  • 6
    • 0027808377 scopus 로고
    • Interposition agents: Transparently interposing user code at the system interface
    • ACM Press
    • Michael B. Jones. Interposition agents: Transparently interposing user code at the system interface. In Proc. of the 14th ACM Symp. on Operating System Principles, pages 80-93. ACM Press, 1993.
    • (1993) Proc. of the 14th ACM Symp. on Operating System Principles , pp. 80-93
    • Jones, M.B.1
  • 7
    • 0034770139 scopus 로고    scopus 로고
    • Identifying similar code with program dependence graphs
    • Jens Krinke. Identifying similar code with program dependence graphs. Working Conf. on Reverse Engineering (WCRE), pages 301-309, 2001.
    • (2001) Working Conf. on Reverse Engineering (WCRE) , pp. 301-309
    • Krinke, J.1
  • 8
    • 77954010661 scopus 로고    scopus 로고
    • Jenny available on the internet. Student summer project 415.780, University of Auckland
    • Hongying (Jenny) Lai. A comparative survey of Java obfuscators available on the internet. Student summer project 415.780, University of Auckland, Computer Science Department, 2001. http: //www.cs.auckland.ac.nz/~cthombor/ Students/hlai/.
    • (2001) A Comparative Survey of Java Obfuscators
    • Lai, H.1
  • 10
    • 85043988965 scopus 로고
    • Finding similar files in a large file system
    • Usenix Association
    • Udi Manber. Finding similar files in a large file system. In Proc. of the USENIX Winter 1994 Technical Conf., pages 1-10. Usenix Association, 1994.
    • (1994) Proc. of the USENIX Winter 1994 Technical Conf. , pp. 1-10
    • Manber, U.1
  • 12
    • 35048854764 scopus 로고    scopus 로고
    • Detecting software theft via whole program path birthmarks
    • In Kan Zhang and Yuliang Zheng, editors, Proc. of the 7th Int. Conf. on Information Security, Springer
    • Ginger Myles and Christian S. Collberg. Detecting software theft via whole program path birthmarks. In Kan Zhang and Yuliang Zheng, editors, Proc. of the 7th Int. Conf. on Information Security, volume 3225 of LNCS, pages 404-415. Springer, 2004.
    • (2004) LNCS , vol.3225 , pp. 404-415
    • Myles, G.1    Collberg, C.S.2
  • 13
    • 33644528723 scopus 로고    scopus 로고
    • Collberg. K-gram based software birthmarks
    • In Hisham Haddad, Lorie M. Liebrock, Andrea Omicini, and Roger L. Wainwright, editors, ACM
    • Ginger Myles and Christian S. Collberg. K-gram based software birthmarks. In Hisham Haddad, Lorie M. Liebrock, Andrea Omicini, and Roger L. Wainwright, editors, Proc. of the 2005 ACM Symp. on Applied Computing, pages 314-318. ACM, 2005.
    • (2005) Proc. of the 2005 ACM Symp. on Applied Computing , pp. 314-318
    • Myles, G.1    Christian, S.2
  • 14
    • 77953968764 scopus 로고    scopus 로고
    • Yuval Oren and Aleksander Slominski. SAXBench, 2002. URL http://piccolo.sourceforge.net/bench.html.
    • (2002) SAXBench
    • Oren, Y.1    Slominski, A.2
  • 15
    • 24144458954 scopus 로고    scopus 로고
    • Purity and side effect analysis for Java programs
    • In Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation
    • Alexandru Salcianu and Martin Rinard. Purity and side effect analysis for Java programs. In Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation, number 3385 in LNCS, pages 199-215, 2005.
    • (2005) LNCS , vol.3385 , pp. 199-215
    • Salcianu, A.1    Rinard, M.2
  • 17
    • 77953975484 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation
    • SPEC. SPEC JVM98 benchmark suite. Standard Performance Evaluation Corporation, 1998.
    • (1998) SPEC. SPEC JVM98 Benchmark Suite
  • 20
    • 77953966861 scopus 로고    scopus 로고
    • Willem van Schaik. PNG Suite, 1996. URL http://www.schaik.com/pngsuite/ pngsuite.html.
    • (1996) PNG Suite
    • Van Schaik, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.