A. Monden, H. Iida, K. M. Torii, and K. , Watermarking java programs, Proceedings of International Symposium on Future Software Technology, 1999.

C. Collberg, E. Carter, S. Debray, A. Huntwork, J. Kececioglu et al., Dynamic path-based software watermarking, Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation PLDI '04, ACM, pp.107-118, 2004.
DOI : 10.1145/996893.996856

C. Collberg and C. Thomborson, Software watermarking, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.99-311, 1999.
DOI : 10.1145/292540.292569

C. Collberg, C. Thomborson, and D. Low, A taxonomy of obfuscating transformations, Tech. Rep, vol.148, 1997.

L. P. Cordella, P. Foggia, C. Sansone, and M. Vento, Performance evaluation of the VF graph matching algorithm, Proceedings 10th International Conference on Image Analysis and Processing, p.1172, 1999.
DOI : 10.1109/ICIAP.1999.797762

D. Eppstein, Subgraph isomorphism in planar graphs and related problems, Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms SODA '95, pp.632-640, 1995.
DOI : 10.1142/9789812777638_0014

URL : http://arxiv.org/abs/cs/9911003

H. Tamada, K. Okamoto, M. N. Ichi-matsumoto, and K. , Detecting the theft of programs using birthmarks, 2003.

H. Tamada, K. Okamoto, M. N. Monden, and A. , Dynamic software birthmarks to detect the theft of windows applications, Proc. International Symposium on Future Software Technology, 2004.

H. Tamada, K. Okamoto, M. N. Ichi-matsumoto, and K. , Design and evaluation of dynamic software birthmarks based on api calls, 2007.

L. P. Cordella, P. Foggia, and C. S. , Subgraph Transformations for the Inexact Matching of Attributed Relational Graphs, Computing, 1998.
DOI : 10.1007/978-3-7091-6487-7_5

G. Myles, C. , and C. , Detecting Software Theft via Whole Program Path Birthmarks, Information Security 7th International Conference, pp.404-415, 2004.
DOI : 10.1007/978-3-540-30144-8_34

G. Myles, C. , and C. , K-gram based software birthmarks, Proceedings of the 2005 ACM symposium on Applied computing , SAC '05, pp.314-318, 2005.
DOI : 10.1145/1066677.1066753

. Nytimes, Former goldman programmer found guilty of code theft, 2010.

D. Schuler, V. Dallmeier, and C. Lindig, A dynamic birthmark for java, Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering , ASE '07, pp.274-283, 2007.
DOI : 10.1145/1321631.1321672

M. Sosonkin, G. Naumovich, and N. Memon, Obfuscation of design intent in object-oriented applications, Proceedings of the 2003 ACM workshop on Digital rights management , DRM '03, pp.142-153, 2003.
DOI : 10.1145/947380.947399

H. Tamada, M. Nakamura, and A. Monden, Design and evaluation of birthmarks for detecting theft of java programs, Proc. IASTED International Conference on Software Engineering, pp.569-575, 2004.

X. Wang, Y. Jhi, S. Zhu, and P. Liu, Behavior based software theft detection, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.280-290, 2009.
DOI : 10.1145/1653662.1653696

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=