Manufacturing cheap, resilient, and stealthy opaque constructs
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Software watermarking: models and dynamic embeddings
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A functional taxonomy for software watermarking
ACSC '02 Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Tamper-proofing software watermarks
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Extraction in software watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Recognition in software watermarking
Proceedings of the 4th ACM international workshop on Contents protection and security
Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. (Lecture Notes in Computer Science)
IH'04 Proceedings of the 6th international conference on Information Hiding
Database security protection via inference detection
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
A survey of software watermarking
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
An ontological approach to the document access problem of insider threat
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Applications of homomorphic functions to software obfuscation
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Information-theoretic analysis of information hiding
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Software watermarking is a technique to protect programs from piracy through embedding secret information into the programs. As software unauthorized use and modification are ubiquitous in the world, progresses in software watermarking will certainly benefit software research and industry. In this paper, we study one of core concepts in this area - informed recognition. To recognize a watermark in a software is to judge the existence of such a watermark in the corresponding software code.