Kang et al., 2021 - Google Patents
Softmark: Software watermarking via a binary function relocationKang et al., 2021
View PDF- Document ID
- 9340672561026043222
- Author
- Kang H
- Kwon Y
- Lee S
- Koo H
- Publication year
- Publication venue
- Proceedings of the 37th Annual Computer Security Applications Conference
External Links
Snippet
The ease of reproducibility of digital artifacts raises a growing concern in copyright infringement; in particular, for a software product. Software watermarking is one of the promising techniques to verify the owner of licensed software by embedding a digital …
- 238000000034 method 0 abstract description 46
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9659157B2 (en) | Systems and methods for watermarking software and other media | |
Naumovich et al. | Preventing piracy, reverse engineering, and tampering | |
Myles et al. | Software watermarking through register allocation: Implementation, analysis, and attacks | |
Collberg et al. | Dynamic graph-based software fingerprinting | |
US20160364707A1 (en) | Potentate: A Cryptography-Obfuscating, Self-Policing, Pervasive Distribution System For Digital Content | |
US20120317421A1 (en) | Fingerprinting Executable Code | |
Hachez | A comparative study of software protection tools suited for e-commerce with contributions to software watermarking and smart cards | |
Collberg et al. | More on graph theoretic software watermarks: Implementation, analysis, and attacks | |
Tian et al. | DKISB: Dynamic key instruction sequence birthmark for software plagiarism detection | |
Kim et al. | Romadroid: A robust and efficient technique for detecting android app clones using a tree structure and components of each app’s manifest file | |
Huang et al. | Smart contract watermarking based on code obfuscation | |
Kang et al. | Softmark: Software watermarking via a binary function relocation | |
Kim et al. | Smartmark: Software watermarking scheme for smart contracts | |
Chen et al. | Software watermarking for java program based on method name encoding | |
Hamilton et al. | An evaluation of the resilience of static java bytecode watermarks against distortive attacks | |
Park et al. | Detecting common modules in Java packages based on static object trace birthmark | |
Chen et al. | Hidden path: dynamic software watermarking based on control flow obfuscation | |
Mullins et al. | Evaluating security of executable steganography for digital software watermarking | |
Hamilton et al. | An evaluation of static java bytecode watermarking | |
Dalla Preda et al. | Exploiting number theory for dynamic software watermarking | |
Kumar et al. | A comparative analysis of static java bytecode software watermarking algorithms | |
Collberg et al. | Uwstego: A general architecture for software watermarking | |
Dey et al. | A robust software watermarking framework using shellcode | |
Memon et al. | A study of software protection techniques | |
Sahoo et al. | Software watermarking in the frequency domain: Implementation, analysis, and attacks |