Hiding Signatures in Variable Names
暂无分享,去创建一个
Jiahui Liu | Dong Li | Yinjie Su | Dong Li | Yi-Zhang Su | Jiahui Liu
[1] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[2] Christian S. Collberg,et al. Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks , 2004, Information Hiding.
[3] M. Shirali-Shahreza,et al. Software Watermarking by Equation Reordering , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.
[4] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[5] Christian S. Collberg,et al. On the Limits of Software Watermarking , 1998 .
[6] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[7] Stavros D. Nikolopoulos,et al. Encoding watermark numbers as cographs using self-inverting permutations , 2011, CompSysTech '11.
[8] Gang Qu,et al. Analysis of watermarking techniques for graph coloring problem , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).
[9] Wang Ying,et al. A strategy of software protection based on multi-watermarking embedding , 2011, 2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA).
[10] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[11] Jongin Lim,et al. Information Security and Cryptology - ICISC 2003 , 2003, Lecture Notes in Computer Science.
[12] Christian S. Collberg,et al. Software watermarking: models and dynamic embeddings , 1999, POPL '99.
[13] Jianmin Wang,et al. A Software Watermark Based Architecture for Cloud Security , 2012, APWeb.
[14] Christian S. Collberg,et al. Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks , 2003, ICISC.
[15] Sebastian Danicic,et al. A survey of static software watermarking , 2011, 2011 World Congress on Internet Security (WorldCIS-2011).
[16] Ramarathnam Venkatesan,et al. A Graph Theoretic Approach to Software Watermarking , 2001, Information Hiding.
[17] Kyuseok Shim,et al. Web Technologies and Applications , 2014, Lecture Notes in Computer Science.