Robust Software Watermarking Scheme Based on Obfuscated Interpretation
暂无分享,去创建一个
[1] Christian S. Collberg,et al. Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks , 2004, Information Hiding.
[2] Ramarathnam Venkatesan,et al. A Graph Theoretic Approach to Software Watermarking , 2001, Information Hiding.
[3] Gael Hachez,et al. A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards , 2003 .
[4] Michael Stepp,et al. More on graph theoretic software watermarks: Implementation, analysis, and attacks , 2009, Inf. Softw. Technol..
[5] Christian S. Collberg,et al. Dynamic graph-based software fingerprinting , 2007, TOPL.
[6] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[7] Jean-Jacques Quisquater,et al. Robust Object Watermarking: Application to Code , 1999, Information Hiding.
[8] Ibrahim Kamel,et al. A robust software watermarking for copyright protection , 2009, Comput. Secur..
[9] Patrick Cousot,et al. An abstract interpretation-based framework for software watermarking , 2004, POPL.
[10] Wanli Zuo,et al. A Framework for Mobile Phone Java Software Protection , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[11] Christian S. Collberg,et al. Software watermarking: models and dynamic embeddings , 1999, POPL '99.
[12] Christian S. Collberg,et al. Software watermarking in the frequency domain: Implementation, analysis, and attacks , 2005, J. Comput. Secur..
[13] Akito Monden,et al. A Framework for Obfuscated Interpretation , 2004, ACSW.
[14] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..