Watermarking java programs, Proceedings of International Symposium on Future Software Technology, 1999. ,
Dynamic path-based software watermarking, Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation PLDI '04, ACM, pp.107-118, 2004. ,
DOI : 10.1145/996893.996856
Software watermarking, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.99-311, 1999. ,
DOI : 10.1145/292540.292569
A taxonomy of obfuscating transformations, Tech. Rep, vol.148, 1997. ,
Performance evaluation of the VF graph matching algorithm, Proceedings 10th International Conference on Image Analysis and Processing, p.1172, 1999. ,
DOI : 10.1109/ICIAP.1999.797762
Subgraph isomorphism in planar graphs and related problems, Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms SODA '95, pp.632-640, 1995. ,
DOI : 10.1142/9789812777638_0014
URL : http://arxiv.org/abs/cs/9911003
Detecting the theft of programs using birthmarks, 2003. ,
Dynamic software birthmarks to detect the theft of windows applications, Proc. International Symposium on Future Software Technology, 2004. ,
Design and evaluation of dynamic software birthmarks based on api calls, 2007. ,
Subgraph Transformations for the Inexact Matching of Attributed Relational Graphs, Computing, 1998. ,
DOI : 10.1007/978-3-7091-6487-7_5
Detecting Software Theft via Whole Program Path Birthmarks, Information Security 7th International Conference, pp.404-415, 2004. ,
DOI : 10.1007/978-3-540-30144-8_34
K-gram based software birthmarks, Proceedings of the 2005 ACM symposium on Applied computing , SAC '05, pp.314-318, 2005. ,
DOI : 10.1145/1066677.1066753
Former goldman programmer found guilty of code theft, 2010. ,
A dynamic birthmark for java, Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering , ASE '07, pp.274-283, 2007. ,
DOI : 10.1145/1321631.1321672
Obfuscation of design intent in object-oriented applications, Proceedings of the 2003 ACM workshop on Digital rights management , DRM '03, pp.142-153, 2003. ,
DOI : 10.1145/947380.947399
Design and evaluation of birthmarks for detecting theft of java programs, Proc. IASTED International Conference on Software Engineering, pp.569-575, 2004. ,
Behavior based software theft detection, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.280-290, 2009. ,
DOI : 10.1145/1653662.1653696
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.403.1637