{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:12:23Z","timestamp":1773655943068,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,3,13]],"date-time":"2005-03-13T00:00:00Z","timestamp":1110672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,3,13]]},"DOI":"10.1145\/1066677.1066753","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"314-318","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":127,"title":["K-gram based software birthmarks"],"prefix":"10.1145","author":[{"given":"Ginger","family":"Myles","sequence":"first","affiliation":[{"name":"University of Arizona, Tucson, AZ"}]},{"given":"Christian","family":"Collberg","sequence":"additional","affiliation":[{"name":"University of Arizona, Tucson, AZ"}]}],"member":"320","published-online":{"date-parts":[[2005,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"A. Aiken. Moss --- a system for detecting software plagiarism. http:\/\/www.cs.berkeley.edu\/~aiken\/moss.html.]]  A. Aiken. Moss --- a system for detecting software plagiarism. http:\/\/www.cs.berkeley.edu\/~aiken\/moss.html.]]"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/832303.836911"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1268256.1268271"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/850947.853341"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/223784.223855"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/829502.830043"},{"key":"e_1_3_2_1_7_1","unstructured":"Center for User Oriented IT Design. Conzilla the concept browser http:\/\/www.conzilla.org.]]  Center for User Oriented IT Design. Conzilla the concept browser http:\/\/www.conzilla.org.]]"},{"key":"e_1_3_2_1_8_1","unstructured":"CodingArt. Codeshield java bytecode obfuscator. http:\/\/www.codingart.com\/codeshield.html.]]  CodingArt. Codeshield java bytecode obfuscator. http:\/\/www.codingart.com\/codeshield.html.]]"},{"key":"e_1_3_2_1_9_1","unstructured":"C. Collberg. Sandmark. http:\/\/www.cs.arizona.edu\/sandmark\/.]]  C. Collberg. Sandmark. http:\/\/www.cs.arizona.edu\/sandmark\/.]]"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of USENIX Workshop on Electronic Commerce","author":"Heintze N.","year":"1996","unstructured":"N. Heintze . Scalable document finger printing . In Proceedings of USENIX Workshop on Electronic Commerce , 1996 .]] N. Heintze. Scalable document finger printing. In Proceedings of USENIX Workshop on Electronic Commerce, 1996.]]"},{"key":"e_1_3_2_1_12_1","unstructured":"Lee Software. Smokescreen Java obfuscator. http:\/\/leesw.com.]]  Lee Software. Smokescreen Java obfuscator. http:\/\/leesw.com.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the USENIX","author":"Manber U.","year":"1994","unstructured":"U. Manber . Finding similar files in a large file system . In Proceedings of the USENIX Winter 1994 Technical Conference, pages 1--10, San Fransisco, CA, USA, 17--21 1994.]] U. Manber. Finding similar files in a large file system. In Proceedings of the USENIX Winter 1994 Technical Conference, pages 1--10, San Fransisco, CA, USA, 17--21 1994.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30144-8_34"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_2_1_17_1","first-page":"589","volume-title":"Proc. IASTED International Conference on Software Engineering (IASTED SE 2004","author":"Tamada H.","year":"2004","unstructured":"H. Tamada , M. Nakamura , A. Monden , and K. Matsumoto . Design and evaluation of birthmarks for detecting theft of java programs . In Proc. IASTED International Conference on Software Engineering (IASTED SE 2004 ), pages 589 -- 575 , Feb 2004 .]] H. Tamada, M. Nakamura, A. Monden, and K. Matsumoto. Design and evaluation of birthmarks for detecting theft of java programs. In Proc. IASTED International Conference on Software Engineering (IASTED SE 2004), pages 589--575, Feb 2004.]]"}],"event":{"name":"SAC05: The 2005 ACM Symposium on Applied Computing","location":"Santa Fe New Mexico","acronym":"SAC05","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 2005 ACM symposium on Applied computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1066677.1066753","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1066677.1066753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:13Z","timestamp":1750262893000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1066677.1066753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,3,13]]},"references-count":15,"alternative-id":["10.1145\/1066677.1066753","10.1145\/1066677"],"URL":"https:\/\/doi.org\/10.1145\/1066677.1066753","relation":{},"subject":[],"published":{"date-parts":[[2005,3,13]]},"assertion":[{"value":"2005-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}