1 |
Ginger Marie Myles, "Software Theft Detection Through Program Identification", Ph. D. Thesis, Department of Computer Science, The University of Arizona, 2006.
|
2 |
Collberg C. S., and Thomborson C., "Watermarking, tamper- proofing, and obfuscation-tools for software protection", IEEE Transactions on software engineering, Vol. 28, pp. 735-746, August. 2002.
DOI
|
3 |
N.R. Wanger, "Fingerprinting", IEEE Symposium on Security and Privacy, pp. 18-22, 1983.
|
4 |
Tamada, H., Okamoto, K., Nakamura, M., Monden, A., and Matsumoto, K. I., "Dynamic software birthmarks to detect the theft of windows applications", International Symposium on Future Software Technology, Vol. 2004, October. 2004,
|
5 |
Tamada, H., Nakamura, M., Monden, A., and Matsumoto, K. I., "Java Birthmarks--Detecting the Software Theft--", IEICE transactions on information and systems, Vol. 88, No.9, pp. 2148-2158, 2005.
|
6 |
Ginger Myles and Christian Collberg, "k-Gram Based Software Birthmarks", In Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 314-318, 2005.
|
7 |
Ricardo B. Y. and Berthier R. N., "Modern Information Retrieval" ACM Press, Vol. 463, 1999.
|
8 |
Galen H. and Doug B., "Detours: binary interception of win32 functions", In Proceedings of the Third USENIX Windows NT Symposium, pp. 135-143, 1999.
|