[1] |
[EB/OL]. 2012.
|
[2] |
COLLBERG C , THOMBORSON C . Software watermarking:models and dynamic embedding[A]. Proceedings of Symposium on Principles of Programming Languages[C]. New York,USA, 1999. 311-324.
|
[3] |
张立和, 杨义先, 钮心忻 ,等. 软件水印综述[J]. 软件学报, 2003,14(2): 268-277. ZHANG L H , YANG Y X , NIU X X ,et al. A survey on software watermarking[J]. Journal of Software, 2003,14(2): 268-277.
|
[4] |
COLLBERG C , THOMBORSON C , TOWNSEND G . Dynamic graph-based software fingerprinting[J]. ACM Transactions on Programming Languages and Systems, 2007,29(6): 35-67.
|
[5] |
KAMELA I , ALBLUWIB Q . A robust software watermarking for copyright protection[J]. Computers & Security, 2009,28(6): 395-409.
|
[6] |
CHEN X J , FANG D Y , SHEN J B . A dynamic graph watermark scheme of tamper resistance[A]. Proceedings of 5th International Conference on Information Assurance and Security[C]. Xi'an,China, 200, 3-6.
|
[7] |
COLLBERG C , CARTER E . Dynamic path-based software watermarking[A]. Proceedings of the ACM Conference on Programming Language Design and Implementation[C]. Washington,CD,USA, 2004. 107-118.
|
[8] |
LARKIN A J , BALADO F , HURLEY N J . Dither modulation watermarking of dynamic memory traces[A]. Proceedings of In rmation Hiding[C]. Berlin,Germany, 2005. 372-386.
|
[9] |
GUPTA G , PIEPRZYK J . Source code watermarking based on function dependency oriented sequencing[A]. Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing[C]. Harbin,China, 2008. 965-968.
|
[10] |
NAGRA J , THOMBORSON C . Threading software watermarks[A]. Proceedings of 6th International Workshop on Information Hiding[C]. Toronto,Canada, 2004,3200: 208-233.
|
[11] |
MYLES G , JIN H . Self-validating branch-based software watermarking[A]. Proceedings of Information Hiding[C]. 2005. 342-356.
|
[12] |
芦斌, 罗向阳, 刘粉林 . 一种基于混沌的软件水印算法框架及实现[J]. 软件学报, 2007,18(2): 351-360. LU B , LUO X Y , LIU F L . A chaos-based rramework and implementation for software watermarking algorithm[J]. Journal of Software, 2007,18(2): 351-360.
|
[13] |
The IDA Pro Book[M]. San Francisco: No Starch PressPress, 2008.
|
[14] |
Gray Hat Python[M]. San Francisco: No Starch PressPress, 2009.
|
[15] |
SHI Y Q , JEON B . A low-cost attack on branch-based software watermarking schemes[A]. Proceedings of the 5th Internat nal Workshop on Digital Watermarking[C]. Jeju Island,Korea, 2006. 282-293
|
[16] |
[EB/OL]. 2012.
|