{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:24:59Z","timestamp":1775053499486,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2006,4,1]],"date-time":"2006-04-01T00:00:00Z","timestamp":1143849600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commerce Res"],"published-print":{"date-parts":[[2006,4]]},"DOI":"10.1007\/s10660-006-6955-z","type":"journal-article","created":{"date-parts":[[2006,4,16]],"date-time":"2006-04-16T07:05:55Z","timestamp":1145171155000},"page":"155-171","source":"Crossref","is-referenced-by-count":41,"title":["Software watermarking via opaque predicates: Implementation, analysis, and attacks"],"prefix":"10.1007","volume":"6","author":[{"given":"Ginger","family":"Myles","sequence":"first","affiliation":[]},{"given":"Christian","family":"Collberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6955_CR1","unstructured":"Business software alliance, http:\/\/www.bsa.org."},{"key":"6955_CR2","unstructured":"Sandmark. http:\/\/www.cs.arizona.edu\/sandmark\/."},{"key":"6955_CR3","unstructured":"Specjvm98 v1.04. http:\/\/www.specbench.org\/osg\/jvm98\/."},{"key":"6955_CR4","unstructured":"Aho, A. V., Sethi, R., & Ullman, J. D. (1988). Compilers: Principles, Techniques, and Tools. Addison-Wesley."},{"key":"6955_CR5","unstructured":"Arboit, G. (2002). A method for watermarking java programs via opaque predicates. In The Fifth International Conference on Electronic Commerce Research (ICECR-5)."},{"key":"6955_CR6","doi-asserted-by":"crossref","unstructured":"Collberg, C., Huntwork, A., Carter, E., & Townsend, G. (2004). Graph theoretic software watermarks: Implementation, analysis, and attacks. In 6th International Information Hiding Workshop.","DOI":"10.1007\/978-3-540-30114-1_14"},{"issue":"4","key":"6955_CR7","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSECP.2003.1219058","volume":"1","author":"C. Collberg","year":"2003","unstructured":"Collberg, C., Myles, G., & Huntwork, A. (2003). Sandmark \u2014 a tool for software protection research. IEEE Security and Privacy, 1(4), 40\u201349.","journal-title":"IEEE Security and Privacy"},{"key":"6955_CR8","unstructured":"Collberg, C., & Thomborson, C. (1999). Software watermarking: Models and dynamic embeddings. In Conference Record of POPL \u201999: The 26th ACM SIGPLANSIGACT Symposium on Principles of Programming Languages (Jan. 1999)."},{"key":"6955_CR9","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., & Low, D. (1998). Manufacturing cheap, resilient, and stealthy opaque constructs. In Principles of Programming Languages 1998, POPL\u201998, San Diego, CA.","DOI":"10.1145\/268946.268962"},{"key":"6955_CR10","doi-asserted-by":"crossref","unstructured":"Christian Collberg, Edward Carter, Saumya Debray, Andrew Huntwork, Cullen Linn, & Mike Stepp. (2004). Dynamic path\u2013based software watermarking. In SIG\u2013PLAN \u201904 Conference on Programming Language Design and Implementation.","DOI":"10.1145\/996841.996856"},{"key":"6955_CR11","unstructured":"Patrick Cousot, & Radhia Cousot (2003). An abstract interpretation\u2013based framework for software watermarking. In Principles of Programming Languages 2003, POPL \u201903, pp. 311\u2013324."},{"key":"6955_CR12","unstructured":"Davidson. R. L., & Myhrvold, N. (1996). Method and system for generating and auditing a signature for a computer program. US Patent 5,559,884, Assignee: Microsoft Corporation."},{"key":"6955_CR13","unstructured":"Hachez, G. (2003). A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards. PhD thesis, Universite Catholique de Louvain."},{"key":"6955_CR14","unstructured":"Monden, A., Hajimu, I., Matsumoto, K., Katsuro, I., & Torii, K. (1999). Watermarking java programs. In Proceedings of International Symposium on Future Software Technology."},{"key":"6955_CR15","doi-asserted-by":"crossref","unstructured":"Monden, A., Iida, H., Matsumoto, K., Inoue, K., & Torii, K. (2000). A practical method for watermarking java programs. In compsac2000, 24th Computer Software and Applications Conference.","DOI":"10.1109\/CMPSAC.2000.884716"},{"key":"6955_CR16","unstructured":"Myles, G., & Collberg, C. (2003). Software watermarking through register allocation: Implementation, analysis, and attacks. In ICISC \u20192003 (International Conference on Information Security and Cryptology)."},{"key":"6955_CR17","doi-asserted-by":"crossref","unstructured":"Nagra, J., & Thomborson, C. (2004). Threading software watermarks. In 6th International Information Hiding Workshop.","DOI":"10.1007\/978-3-540-30114-1_15"},{"key":"6955_CR18","unstructured":"Nagra, J., Thomborson, C., & Collberg, C. (2002). A functional taxonomy for software watermarking. In Michael J. Oudshoorn, editor, Twenty-Fifth Australasian Computer Science Conference (ACSC2002), Conferences in Research and Practice in Information Technology, Melbourne, Australia, ACS."},{"key":"6955_CR19","doi-asserted-by":"crossref","unstructured":"Palsberg, J., Krishnaswamy, S., Kwon, M., Ma, D., Shao, Q., & Zhang, Y. (2000). Experience with software watermarking. In Proceedings of ACSAC\u201900, 16th Annual Computer Security Applications Conference, pp. 308\u2013316.","DOI":"10.1109\/ACSAC.2000.898885"},{"key":"6955_CR20","unstructured":"Gang Qu, & Miodrag Potkonjak (1999). Hiding signatures in graph coloring solutions. In International Information Hiding Workshop, pp. 348\u2013367."},{"key":"6955_CR21","unstructured":"Sahoo, T. R., & Collberg, C. (2004). Software watermarking in the frequency domain: Implementation, analysis, and attacks. Technical Report TR04\u201307, Department of Computer Science, University of Arizona."},{"key":"6955_CR22","unstructured":"Pendragon Software. Caffeinemark 3.0. (1998). http:\/\/www.pendragon-software.com\/pendragon\/cm3\/."},{"key":"6955_CR23","unstructured":"Stern, J. P., Hachez, G., Koeune, F., & Quisquater, J. (1999). Robust object watermarking: Application to code. In International Information Hiding Workshop, pp. 368\u2013378."},{"key":"6955_CR24","first-page":"121","volume":"3","author":"F. Tip","year":"1995","unstructured":"Tip, F. (1995). A survey of program slicing techniques. Journal of programming languages 3, 121\u2013189.","journal-title":"Journal of programming languages"},{"key":"6955_CR25","doi-asserted-by":"crossref","unstructured":"Venkatesan, R., Vazirani, V., & Sinha, S. (2001). A graph theoretic approach to software watermarking. In 4th International Information Hiding Workshop, Pittsburgh, PA.","DOI":"10.1007\/3-540-45496-9_12"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-006-6955-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-006-6955-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-006-6955-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:49:52Z","timestamp":1559249392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-006-6955-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,4]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,4]]}},"alternative-id":["6955"],"URL":"https:\/\/doi.org\/10.1007\/s10660-006-6955-z","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,4]]}}}