{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:18:55Z","timestamp":1725790735019},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232087"},{"type":"electronic","value":"9783540301448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_34","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:34:45Z","timestamp":1284856485000},"page":"404-415","source":"Crossref","is-referenced-by-count":71,"title":["Detecting Software Theft via Whole Program Path Birthmarks"],"prefix":"10.1007","author":[{"given":"Ginger","family":"Myles","sequence":"first","affiliation":[]},{"given":"Christian","family":"Collberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"Codeshield java bytecode obfuscator, http:\/\/www.codingart.com\/codeshield.html"},{"key":"34_CR2","unstructured":"Sandmark, http:\/\/www.cs.arizona.edu\/sandmark\/"},{"key":"34_CR3","unstructured":"Smokescreen java obfuscator, http:\/\/leesw.com"},{"key":"34_CR4","unstructured":"klassmaster.,Z.: http:\/\/www.zelix.com\/klassmaster\/index.html"},{"key":"34_CR5","unstructured":"Aiken, A.: Moss \u2013 a system for detecting software plagiarism , http:\/\/www.cs.berkeley.edu\/aiken\/moss.html"},{"issue":"4","key":"34_CR6","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas On, F.A.P.: the limits of steganography. IEEE Journal of Selected Areas in Communications\u00a016(4), 474\u2013481 (1998) ,Special issue on copyright & privacy protection","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"34_CR7","unstructured":"Arboit, G.: A method for watermarking java programs via opaque predicates. In: The Fifth International Conference on Electronic Commerce Research, ICECR-5 (2002)"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Bunke, H., Shearer, K.: A graph distance metric based on the maximal common subgraph (1998)","DOI":"10.1016\/S0167-8655(97)00179-7"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Collberg, C., Carter, E., Debray, S., Huntwork, A., Linn, C., Stepp, M.: Dynamic path-based software watermarking. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2004 (2004)","DOI":"10.1145\/996841.996856"},{"key":"34_CR10","unstructured":"Collberg, C., Myles, G., Stepp, M.: Cheating cheating detectors. Technical Report TR04-05, University of Arizona (2004)"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Christian Collberg and Clark Thomborson. Software watermarking: Models and dynamic embeddings. In: Conference Record of POPL 1999: The 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (January 1999), http:\/\/citeseer.nj.nec.com\/collberg99software.html","DOI":"10.1145\/292540.292569"},{"key":"34_CR12","unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland (July 1997)"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Principles of Programming Languages 1998, POPL 1998, San Diego, CA (January 1998)","DOI":"10.1145\/268946.268962"},{"key":"34_CR14","unstructured":"Davidson, R.L., Myhrvold, N.: Method and system for generating and auditing a signature for a computer program. US Patent 5,559,884, Assignee: Microsoft Corporation (1996), http:\/\/www.delphion.com\/details?pn=US05559884_"},{"key":"34_CR15","first-page":"122","volume-title":"The Protection of Computer Software \u2013 Its Technology and Applications","author":"D. Grover","year":"1989","unstructured":"Grover, D.: Program identification. In: Grover, D. (ed.) The Protection of Computer Software \u2013 Its Technology and Applications, pp. 122\u2013154. Cambridge University Press, Cambridge (1989)"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Larus, J.R.: Whole program paths. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 1999 (1999)","DOI":"10.1145\/301618.301678"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Monden, A., Iida, H., Matsumoto, K., Inoue, K., Torii, K.: A practical method for watermarking java programs. In: Compsac2000, 24th Computer Software and Applications Conference (2000)","DOI":"10.1109\/CMPSAC.2000.884716"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Nevill-Manning, C.G., Witten, I.H.: Compression and explanation using hierarchical grammars. The Computer Journal\u00a040(2\/3) (1997)","DOI":"10.1093\/comjnl\/40.2_and_3.103"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Nevill-Manning, C.G., Witten, I.H.: Linear-time, incremental hierarchy inference for compression. In: Proceedings of the Data Compression Conference, DCC 1997 (1997)","DOI":"10.1109\/DCC.1997.581951"},{"key":"34_CR20","doi-asserted-by":"crossref","unstructured":"Qu, G., Potkonjak, M.: Hiding signatures in graph coloring solutions. Information Hiding, 348\u2013367 (1999)","DOI":"10.1007\/10719724_24"},{"key":"34_CR21","doi-asserted-by":"crossref","unstructured":"Schleimer, S., Wilkerson, D., Aiken, A.: Winnowing: Local algorithms for document fingerprinting. In: Proceedings of the 2003 SIGMOD Conference (2003)","DOI":"10.1145\/872757.872770"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Stern, J.P., Hachez, G., Koeune, F., Quisquater Robust, J.-J.: object watermarking: Application to code. Information Hiding, 368\u2013378 (1999), http:\/\/citeseer.nj.nec.com\/stern00robust.html","DOI":"10.1007\/10719724_25"},{"key":"34_CR23","unstructured":"Tamada, H., Nakamura, M., Monden, A., Matsumoto, K.: Detecting the theft of programs using birthmarks. Information Science Technical Report NAIST-IS-TR2003014 ISSN 0919-9527, Graduate School of Information Science, Nara Institute of Science and Technology (November 2003)"},{"key":"34_CR24","unstructured":"Tamada, H., Nakamura, M., Monden, A., Matsumoto, K.: Design and evaluation of birthmarks for detecting theft of java programs. In: Proc. IASTED International Conference on Software Engineering (IASTED SE 2004), February 2004, pp. 569\u2013575 (2004)"},{"key":"34_CR25","doi-asserted-by":"crossref","unstructured":"Venkatesan, R., Vazirani, V., Sinha, S.: A graph theoretic approach to software watermarking. In: 4th International Information Hiding Workshop, Pittsburgh, PA (April 2001)","DOI":"10.1007\/3-540-45496-9_12"},{"key":"34_CR26","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1093\/comjnl\/33.2.140","volume":"33","author":"G. Whale","year":"1990","unstructured":"Whale, G.: Identification of program similarity in large populations. Computer Journal\u00a033, 140\u2013146 (1990)","journal-title":"Computer Journal"},{"key":"34_CR27","doi-asserted-by":"crossref","unstructured":"Wise, M.J.: Detection of similarities in student programs: Yap\u2019ing may be preferable to plague\u2019ing. In: 23rd SIGCSE Technical Symposium, pp. 268\u2013271 (1992)","DOI":"10.1145\/134510.134564"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:44:59Z","timestamp":1605761099000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}