{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:07Z","timestamp":1750306807412,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,1,9]],"date-time":"2014-01-09T00:00:00Z","timestamp":1389225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2010-0024495"],"award-info":[{"award-number":["NRF-2010-0024495"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Culture, Sports and Tourism (MCST), Korea Copyright Commission"},{"DOI":"10.13039\/501100003561","name":"Ministry of Culture, Sports and Tourism","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003561","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,1,9]]},"DOI":"10.1145\/2557977.2558062","type":"proceedings-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T13:07:05Z","timestamp":1396357625000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["A birthmark-based method for intellectual software asset management"],"prefix":"10.1145","author":[{"given":"Dongjin","family":"Kim","sequence":"first","affiliation":[{"name":"Dankook University, Yongin, Korea"}]},{"given":"Jeongoh","family":"Moon","sequence":"additional","affiliation":[{"name":"Dankook University, Yongin, Korea"}]},{"given":"Seong-je","family":"Cho","sequence":"additional","affiliation":[{"name":"Dankook University, Yongin, Korea"}]},{"given":"Jongmoo","family":"Choi","sequence":"additional","affiliation":[{"name":"Dankook University, Yongin, Korea"}]},{"given":"Minkyu","family":"Park","sequence":"additional","affiliation":[{"name":"Konkuk University, Chungbuk, Korea"}]},{"given":"Sangchul","family":"Han","sequence":"additional","affiliation":[{"name":"Konkuk University, Chungbuk, Korea"}]},{"given":"Lawrence","family":"Chung","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Texas"}]}],"member":"320","published-online":{"date-parts":[[2014,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"BSA. The Software Alliance. http:\/\/www.bsa.org  BSA. The Software Alliance. http:\/\/www.bsa.org"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224299505900103"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"e_1_3_2_1_4_1","unstructured":"Bezmen T. L. and Depken C. A. 2004. The Impact of Software Piracy on Economic Development. Working Paper. Francis Marion University.  Bezmen T. L. and Depken C. A. 2004. The Impact of Software Piracy on Economic Development . Working Paper. Francis Marion University."},{"key":"e_1_3_2_1_5_1","unstructured":"Information Age. 2010. SAP to pay Oracle $1.3 bn for IP theft. Web article. http:\/\/www.information-age.com\/technology\/applications-and-development\/1301303\/sap-to-pay-oracle-$13-bn-for-ip-theft%C2%A0  Information Age. 2010. SAP to pay Oracle $1.3 bn for IP theft . Web article. http:\/\/www.information-age.com\/technology\/applications-and-development\/1301303\/sap-to-pay-oracle-$13-bn-for-ip-theft%C2%A0"},{"key":"e_1_3_2_1_6_1","unstructured":"BSA. The Software Alliance Advocacy\/Security. http:\/\/www.bsa.org\/advocacy\/security  BSA. The Software Alliance Advocacy\/Security. http:\/\/www.bsa.org\/advocacy\/security"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 12th Asian Computing Science Conference (ASIAN). (Dec.","author":"Choi S.","year":"2007","unstructured":"Choi , S. , Park , H. , Lim . H. and Han , T . 2007. A Static Birthmark of Binary Executables Based on API Call Structures . In Proceedings of the 12th Asian Computing Science Conference (ASIAN). (Dec. 2007 ). Choi, S., Park, H., Lim. H. and Han, T. 2007. A Static Birthmark of Binary Executables Based on API Call Structures. In Proceedings of the 12th Asian Computing Science Conference (ASIAN). (Dec. 2007)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30144-8_34"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.24"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653696"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2013.159"},{"key":"e_1_3_2_1_12_1","unstructured":"Inquire Technology. Shoppers cautioned against pirated software this holiday season. Web article. http:\/\/technology.inquirer.net\/21291\/shoppers-cautioned-against-pirated-software-this-holiday-season  Inquire Technology. Shoppers cautioned against pirated software this holiday season . Web article. http:\/\/technology.inquirer.net\/21291\/shoppers-cautioned-against-pirated-software-this-holiday-season"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Jin H. and Lotspiech J. 2003. Proactive Software Tampering Detection. LNCS. 2851. 352--365.  Jin H. and Lotspiech J. 2003. Proactive Software Tampering Detection. LNCS . 2851. 352--365.","DOI":"10.1007\/10958513_27"},{"key":"e_1_3_2_1_15_1","first-page":"6","article-title":"Dealing with Piracy: Intellectual Asset Management in Music and Software","volume":"20","author":"Wijk J. v.","year":"2002","unstructured":"Wijk , J. v. 2002 . Dealing with Piracy: Intellectual Asset Management in Music and Software . European Management Journal. 20 , 6 (Dec. 2002), 689--698. Wijk, J. v. 2002. Dealing with Piracy: Intellectual Asset Management in Music and Software. European Management Journal. 20, 6 (Dec. 2002), 689--698.","journal-title":"European Management Journal."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.1999070102"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609662"},{"key":"e_1_3_2_1_18_1","unstructured":"pefile https:\/\/code.google.com\/p\/pefile\/  pefile https:\/\/code.google.com\/p\/pefile\/"},{"key":"e_1_3_2_1_19_1","unstructured":"IDAPython https:\/\/code.google.com\/p\/idapython\/  IDAPython https:\/\/code.google.com\/p\/idapython\/"}],"event":{"name":"ICUIMC '14: The 8th International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SKKU SUNGKYUNKWAN UNIVERSITY"],"location":"Siem Reap Cambodia","acronym":"ICUIMC '14"},"container-title":["Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558062","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557977.2558062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:35:00Z","timestamp":1750232100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558062"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,9]]},"references-count":18,"alternative-id":["10.1145\/2557977.2558062","10.1145\/2557977"],"URL":"https:\/\/doi.org\/10.1145\/2557977.2558062","relation":{},"subject":[],"published":{"date-parts":[[2014,1,9]]},"assertion":[{"value":"2014-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}