1 |
H. Tamada, K. Okamoto, M. Nakamura, A. Monden, and K. Matsumoto, 'Dynamic software birthmarks to detect the theft of windows applications,' Proc. International Symposium on Future Software Technology, pp.20-22, 2004
|
2 |
Heewan Park, Seokwoo Choi, Hyun-il Lim, and Taisook Han, 'Detecting Java Theft Based on Static API Trace Birthmark,' Third International Workshop on Security (IWSEC 2008), LNCS 5312-0121, November 25-27, 2008
|
3 |
Ginger Myles and Christian S. Collberg, Detecting software theft via whole program path birthmarks, In Proc. of the 7th Int. Conf. on Information Security, vol.3225 of LNCS, Springer, pp.404-415, 2004
|
4 |
G. Hunt and D. Brubacher, 'Detours: Binary interception of Win32 functions,' Proceedings of the 3rd USENIX Windows NT Symposium, pp. 135-143, 1999
|
5 |
C. Linn and S. Debray, 'Obfuscation of executable code to improve resistance to static disassembly,' in Proceedings of the 10th ACM conference on Computer and communications security, pp.290-299, 2003
DOI
|
6 |
D. Schuler, V. Dallmeier, and C. Lindig, 'A Dynamic Birthmark for Java,' in Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering, 2007
|
7 |
G. Myles and C. S. Collberg, 'Software theft detection through program identification,' PhD. thesis. University of Arizona, 2006
|
8 |
H. Tamada, M. Nakamura, A. Monden, and K. I. Matsumoto, 'Java Birthmarks-Detecting the Software Theft,' IEICE Transactions on Information and Systems, pp.2148-2158, 2005
|
9 |
G. Myles and C. Collberg, 'K-gram based software birthmarks,' Proceedings of the 2005 ACM symposium on Applied computing (SAC'05), 2005
|
10 |
Hyun-il Lim, Heewan Park, Seokwoo Choi, and Taisook Han, 'Detecting Theft of Java Applications via a Static Birthmark Based on Weighted Stack Patterns,' IEICE Trans. On Information and Systems, vol.91, no.9, September 2008
|
11 |
C. S. Collberg and C. Thomborson, 'Watermarking, tamper-proofing, and obfuscation-tools for software protection,' IEEE Transactions on software engineering, vol.28, pp.735-746, 2002
DOI
ScienceOn
|
12 |
C. Wang, 'A security architecture for survivability mechanisms,' PhD thesis. University of Virginia, 2000
|
13 |
S. Choi, H. Park, H. Lim, and T. Han, 'A static birthmark of binary executables based on API call structure,' Lecture Notes in Computer Science, vol.4846, pp.2-16, 2007
DOI
ScienceOn
|