1 |
KOCCA, "White paper on Korean Games", Dec. 2012
|
2 |
VPNrank, "Best Game Torrents Sites", https://www.vpnranks.com/best-gametorrents-sites/, Aug, 2018.
|
3 |
Ji-young Woo, Huy-Kang Kim. "Survey and research direction on online game security." Proceedings of the Workshop at SIGGRAPH Asia. ACM, 2012.
|
4 |
Game Donga, "the history of crack group", http://game.donga.com/51123/
|
5 |
CrackWatch, "Crack Status of All Games", https://crackwatch.com/, Aug. 2018.
|
6 |
Byung-Il Kwak, Huy-Kang Kim. "A survey and categorization of anomaly detection in online games," Journal of the Korea Institute of Information Security & Cryptology, Vol. 25, No. 5, pp. 1097-1114, Oct, 2015.
DOI
|
7 |
Steven Davis. Protecting games: a security handbook for game developers and publishers. Charles River Media, Inc., 2009.
|
8 |
Myung-Shin Oh and Seung-Jo Han, "The Secure Chip for Software Illegal Copy Protection," Journal of the Korea Institute of Information Security & Cryptology, Vol. 12, No. 4, pp. 87-98, Aug, 2002.
|
9 |
JJong-Woo Kim, Won-Il Yang and Seung Jo Han, "Design of DRM Frame for Digital Contents Protection in Network," Journal of the Korea Institute of Information Security & Cryptology, Vol. 16, No. 3, pp. 101-113, Jun, 2006.
|
10 |
Jin-Heung Lee, Tea-Jung Kim and Ji-Hwan Park, "Design and Implementation of Secure DRM System for Contents Streaming," Journal of the Korea Institute of Information Security & Cryptology, Vol. 13, No. 4, pp. 177-186, Aug, 2003.
|
11 |
Seong-Soo Park and Hwan-Soo Han, "Detecting Software Similarity Using API Sequences on Static Major Paths," Journal of KIISE, Vol. 41, No. 12, pp. 1007-1012, Dec, 2014.
DOI
|
12 |
Seok-Woo Choi, Woo-Young Cho and Tai-Sook Han, "A Functional Unit Dynamic API Birthmark for Windows Programs Code Theft Detection," Journal of KISS : Software and Applications, Vol. 36, No. 9, pp. 767-776, Sep, 2009.
|
13 |
Jong-Cheon Choi, Yong-Man Han, Seong-Je Cho, Hae-Young Yoo, Jin-Woon Woo. "A static birthmark for MS windows applications using import address table." Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on. IEEE, 2013.
|
14 |
Ho-Dong Lee, Reverse Engineering Volume 1 File Structure, Hanbit Meia, Sep, 2016.
|
15 |
Seok-Woo Choi, Hee-Wan Park, Hyun-Il Lim, Tai-Sook Han. "A static birthmark of binary executables based on API call structure." In Annual Asian Computing Science Conference Springer, Berlin, Heidelberg. pp. 2-16. Dec. 2007.
|
16 |
Protection ID Home Page, "Protection iD", http://pid.gamecopyworld.com, Aug, 2018.
|
17 |
Dong-Jin Kim, Yong-Man Han, Seong-Je Cho, Hae-Young Yoo, Jin-Woon Woo, Yun-Mook Nah, Min-Kyu Park, Lawrence Chung. "Measuring similarity of windows applications using static and dynamic birthmarks." Proceedings of the 28th Annual ACM Symposium on Applied Computing. ACM, 2013.
|
18 |
Steam, "Steam DRM Documentation", https://partner.steamgames.com/doc/features/drm, Aug. 2018.
|
19 |
PCGamingWiki, "Cyanic / SteamDRM", http://pcgamingwiki.com/wiki/User:Cyanic/Steam_DRM, Aug. 2018.
|
20 |
Github, "Steamless, DRM remover", https://github.com/atom0s/Steamless, Aug. 2018.
|
21 |
Tae-Ho Kwon, Zhendong Su. "Automatic detection of unsafe dynamic component loadings." IEEE Transactions on Software Engineering 38.2 (2012): 293-313.
DOI
|
22 |
Galen Hunt, Doug Brubacher. "Detours: Binary interception of win 3 2 functions." 3rd usenix windows nt symposium. 1999.
|
23 |
In-Kyeom Cho and Eul-Gyu Im, "Improvement of Performance of Malware Similarity Analysis by the Sequence Alignment Technique," KIISE Transactions on Computing Practices, Vol. 21, No. 3, pp. 263-268, Mar, 2015.
DOI
|
24 |
Eun-Soon You, Gun-Hee Choi Seung-Hoon Kim, "Study on Extraction of Keywords Using TF-IDF and Text Structure of Novels," Journal of the Korea Society of Computer and Information, Vol. 20, No. 2, pp.121-129, Feb, 2015.
DOI
|
25 |
Starforce, "Game Protection Steam" , http://www.star-force.com/blog/index.php?blog=2683, Aug. 2018.
|