A fuzzy hashing technique for large scale software birthmarks
暂无分享,去创建一个
[1] Hyun-il Lim,et al. Detecting Theft of Java Applications via a Static Birthmark Based on Weighted Stack Patterns , 2008, IEICE Trans. Inf. Syst..
[2] Christian S. Collberg,et al. K-gram based software birthmarks , 2005, SAC '05.
[3] Vladimir I. Levenshtein,et al. Binary codes capable of correcting deletions, insertions, and reversals , 1965 .
[4] Collin McMillan,et al. Detecting similar software applications , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[5] Hyun-il Lim,et al. A static API birthmark for Windows binary executables , 2009, J. Syst. Softw..
[6] Akito Monden,et al. Java Birthmarks - Detecting the Software Theft - , 2005, IEICE Trans. Inf. Syst..
[7] Sencun Zhu,et al. Value-based program characterization and its application to software plagiarism detection , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[8] David Schuler,et al. A dynamic birthmark for java , 2007, ASE.
[9] Akito Monden,et al. Design and evaluation of birthmarks for detecting theft of java programs , 2004, IASTED Conf. on Software Engineering.
[10] Siu-Ming Yiu,et al. Heap Graph Based Software Theft Detection , 2013, IEEE Transactions on Information Forensics and Security.
[11] Hyun-il Lim,et al. A Static Java Birthmark Based on Operand Stack Behaviors , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[12] Jesse D. Kornblum. Identifying almost identical files using context triggered piecewise hashing , 2006, Digit. Investig..