-
3
-
-
84904098864
-
-
Semantic designs inc. C source code obfuscator. http://www.semdesigns. com/products/obfuscators/CObfuscator.html.
-
C Source Code Obfuscator
-
-
-
4
-
-
0022252695
-
The n-version approach to fault-tolerant software
-
11, December
-
A. Avizienis. The n-version approach to fault-tolerant software. IEEE Trans. Softw. Eng., 11, December 1985.
-
(1985)
IEEE Trans. Softw. Eng.
-
-
Avizienis, A.1
-
6
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In Proceedings of the International Conference on Software Maintenance, ICSM '98, 1998.
-
Proceedings of the International Conference on Software Maintenance, ICSM '98, 1998
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
8
-
-
70349141059
-
On the limits of information flow techniques for malware analysis and containment
-
L. Cavallaro, P. Saxena, and R. Sekar. On the limits of information flow techniques for malware analysis and containment. In DIMVA' 08, 2008.
-
(2008)
DIMVA' 08
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
10
-
-
8344263880
-
Dynamic path-based software watermarking
-
C. Collberg, E. Carter, S. Debray, A. Huntwork, J. Kececioglu, C. Linn, and M. Stepp. Dynamic path-based software watermarking. In Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation, PLDI '04, 2004.
-
Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation, PLDI '04, 2004
-
-
Collberg, C.1
Carter, E.2
Debray, S.3
Huntwork, A.4
Kececioglu, J.5
Linn, C.6
Stepp, M.7
-
15
-
-
84885626052
-
-
GrammaTech. Codesurfer. http://www.grammatech.com.
-
Codesurfer
-
-
-
17
-
-
79959902968
-
Value-based program characterization and its application to software plagiarism detection
-
Y.-C. Jhi, X. Wang, X. Jia, S. Zhu, P. Liu, and D. Wu. Value-based program characterization and its application to software plagiarism detection. In 33rd International Conference on Software Engineering (ICSE 2011), the SEIP track, 2011.
-
33rd International Conference on Software Engineering (ICSE 2011), the SEIP Track, 2011
-
-
Jhi, Y.-C.1
Wang, X.2
Jia, X.3
Zhu, S.4
Liu, P.5
Wu, D.6
-
19
-
-
0036648690
-
Ccfinder: A multilinguistic token-based code clone detection system for large scale source code
-
28, July
-
T. Kamiya, S. Kusumoto, and K. Inoue. Ccfinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng., 28, July 2002.
-
(2002)
IEEE Trans. Softw. Eng.
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
24
-
-
47749093923
-
A software birthmark based on dynamic opcode N-gram
-
B. Lu, F. Liu, X. Ge, B. Liu, and X. Luo. A software birthmark based on dynamic opcode N-gram. International Conference on Semantic Computing, pages 37-44, 2007.
-
(2007)
International Conference on Semantic Computing
, pp. 37-44
-
-
Lu, B.1
Liu, F.2
Ge, X.3
Liu, B.4
Luo, X.5
-
26
-
-
35048854764
-
Detecting software theft via whole program path birthmarks
-
G. Myles and C. Collberg. Detecting software theft via whole program path birthmarks. Information Security, 3225/2004:404-415, 2004.
-
(2004)
Information Security
, vol.3225
, Issue.2004
, pp. 404-415
-
-
Myles, G.1
Collberg, C.2
-
28
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the NDSS 2005, 2005.
-
Proceedings of the NDSS 2005, 2005
-
-
Newsome, J.1
Song, D.2
-
30
-
-
85008263762
-
Detecting code clones in binary executables
-
A. Sæbjørnsen, J. Willcock, T. Panas, D. Quinlan, and Z. Su. Detecting code clones in binary executables. In Proceedings of the eighteenth international symposium on Software testing and analysis, ISSTA '09, 2009.
-
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, ISSTA '09, 2009
-
-
Sæbjørnsen, A.1
Willcock, J.2
Panas, T.3
Quinlan, D.4
Su, Z.5
-
34
-
-
38349021089
-
Dynamic software birthmarks to detect the theft of windows applications
-
H. Tamada, K. Okamoto, M. Nakamura, A. Monden, and K. ichi Matsumoto. Dynamic software birthmarks to detect the theft of windows applications. In Int. Symp. on Future Software Technology, 2004.
-
Int. Symp. on Future Software Technology, 2004
-
-
Tamada, H.1
Okamoto, K.2
Nakamura, M.3
Monden, A.4
Matsumoto, K.I.5
-
35
-
-
24944466169
-
Tamper-proofing software watermarks
-
ACSW Frontiers '04
-
C. Thomborson, J. Nagra, R. Somaraju, and C. He. Tamper-proofing software watermarks. In Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32, ACSW Frontiers '04, 2004.
-
(2004)
Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation
, vol.32
-
-
Thomborson, C.1
Nagra, J.2
Somaraju, R.3
He, C.4
-
36
-
-
74049163233
-
Behavior based software theft detection
-
New York, NY, USA, ACM
-
X. Wang, Y.-C. Jhi, S. Zhu, and P. Liu. Behavior based software theft detection. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 280-290, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 280-290
-
-
Wang, X.1
Jhi, Y.-C.2
Zhu, S.3
Liu, P.4
-
37
-
-
77950834638
-
Detecting software theft via system call based birthmarks
-
X. Wang, Y.-C. Jhi, S. Zhu, and P. Liu. Detecting software theft via system call based birthmarks. In ACSAC, 2009.
-
(2009)
ACSAC
-
-
Wang, X.1
Jhi, Y.-C.2
Zhu, S.3
Liu, P.4
|