{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:57:36Z","timestamp":1742385456143},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540213765"},{"type":"electronic","value":"9783540246916"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24691-6_21","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T08:20:22Z","timestamp":1294388422000},"page":"274-293","source":"Crossref","is-referenced-by-count":21,"title":["Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks"],"prefix":"10.1007","author":[{"given":"Ginger","family":"Myles","sequence":"first","affiliation":[]},{"given":"Christian","family":"Collberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Bcel, \n                    \n                      http:\/\/jakarta.apache.org\/bcel\/"},{"key":"21_CR2","unstructured":"Bloat: The bytecode-level optimizer and analysis tool, \n                    \n                      http:\/\/www.cs.purdue.edu\/s3\/projects\/bloat\/"},{"key":"21_CR3","unstructured":"Jad - the fast java decompiler, \n                    \n                      http:\/\/www.geocities.com\/zzxu\/jad.html"},{"key":"21_CR4","unstructured":"Sandmark, \n                    \n                      http:\/\/www.cs.arizona.edu\/sandmark\/"},{"key":"21_CR5","unstructured":"Spec jvm98 v1.04, \n                    \n                      http:\/\/www.specbench.org\/osg\/jvm98\/"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/3-540-61996-8_49","volume-title":"Information Hiding","author":"D. Aucsmith","year":"1996","unstructured":"Aucsmith, D.: Tamper resistant software: An implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 317\u2013333. Springer, Heidelberg (1996)"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/3-540-47870-1_10","volume-title":"Security and Privacy in Digital Rights Management","author":"H. Chang","year":"2002","unstructured":"Chang, H., Atallah, M.: Protecting software code by guards. In: Sander, T. (ed.) DRM 2001. LNCS, vol.\u00a02320, p. 160. Springer, Heidelberg (2002), \n                    \n                      http:\/\/www.star-lab.com\/sander\/spdrm\/papers.html"},{"issue":"4","key":"21_CR8","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSECP.2003.1219058","volume":"1","author":"C. Collberg","year":"2003","unstructured":"Collberg, C., Myles, G., Huntwork, A.: Sandmark - a tool for software protection research. IEEE Security and Privacy\u00a01(4), 40\u201349 (2003)","journal-title":"IEEE Security and Privacy"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings. In: Principles of Programming Languages 1999, POPL 1999, pp. 311\u2013324 (1999)","DOI":"10.1145\/292540.292569"},{"key":"21_CR10","unstructured":"Davidson, R.L., Myhrvold, N.: Method and system for generating and auditing a signature for a computer program. US Patent 5,559,884, Assignee: Microsoft Corporation (1996), \n                    \n                      http:\/\/www.delphion.com\/details?pn=US05559884"},{"key":"21_CR11","unstructured":"Hachez, G.: A Comparative Study of Software Protection Tools Suited for ECommerce with Contributions to Software Watermarking and Smart Cards. PhD thesis, Universite Catholique de Louvain (2003)"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/3-540-47870-1_9","volume-title":"Security and Privacy in Digital Rights Management","author":"B. Horne","year":"2002","unstructured":"Horne, B., Matheson, L., Sheehan, C., Tarjan, R.E.: Dynamic self-checking techniques for improved tamper resistance. In: Sander, T. (ed.) DRM 2001. LNCS, vol.\u00a02320, p. 141. Springer, Heidelberg (2002)"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/3-540-45496-9_7","volume-title":"Information Hiding","author":"F. Koushanfar","year":"2001","unstructured":"Koushanfar, F., Qu, G., Potkonjak, M.: Intellectual property metering. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 87\u2013102. Springer, Heidelberg (2001)"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Linn, C., Debray, S.K.: Obfuscation of executable code to improve resistance to static disassembly. In: ACM Conference on Computer and Communications Security (October 2003)","DOI":"10.1145\/948109.948149"},{"key":"21_CR15","unstructured":"International Planning and Research Corporation. In: Sixth annual BSA global software piracy study (2001)"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Qu, G., Wong, J.L., Potkonjak, M.: Fair watermarking techniques. In: EEE\/ACM Asia and South Pacific Design Automation Conference, pp. 55\u201360 (2000)","DOI":"10.1145\/368434.368512"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Qu, G., Potkonjak, M.: Analysis of watermarking techniques for graph coloring problem. In: ICCAD, pp. 190\u2013193 (1998)","DOI":"10.1145\/288548.288607"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/10719724_24","volume-title":"Information Hiding","author":"G. Qu","year":"2000","unstructured":"Qu, G., Potkonjak, M.: Hiding signatures in graph coloring solutions. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 348\u2013367. Springer, Heidelberg (2000)"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Qu, G., Potkonjak, M.: Fingerprinting intellectual property using constraint-addition. In: Design Automation Conference, pp. 587\u2013592 (2000)","DOI":"10.1145\/337292.337586"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Qu, G., Wong, J.L., Potkonjak, M.: Optimization-intensive watermarking techniques for decision problems. In: Design Automation Conference, pp. 33\u201336 (1999)","DOI":"10.1145\/309847.309860"},{"key":"21_CR21","unstructured":"Sahoo, T.R., Collberg, C.: Software watermarking in the frequency domain: Implementation, analysis, and attacks. In: ACM Symposium on Applied Computing (March 2004) (to appear)"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.-J.: Robust object watermarking: Application to code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 368\u2013378. Springer, Heidelberg (2000), \n                    \n                      http:\/\/citeseer.nj.nec.com\/stern00robust.html","DOI":"10.1007\/10719724_25"},{"key":"21_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-45496-9_12","volume-title":"Information Hiding","author":"R. Venkatesan","year":"2001","unstructured":"Venkatesan, R., Vazirani, V., Sinha, S.: A graph theoretic approach to software watermarking. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, p. 157. Springer, Heidelberg (2001), \n                    \n                      http:\/\/link.springer.de\/link\/service\/series\/0558\/bibs\/2137\/21370157.htm"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Wolfe, G., Wong, J.L., Potkonjak, M.: Watermarking graph partitioning solutions. In: Design Automation Conference, pp. 486\u2013489 (2001)","DOI":"10.1145\/378239.378567"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24691-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,23]],"date-time":"2019-03-23T11:41:56Z","timestamp":1553341316000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24691-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540213765","9783540246916"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24691-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}