Sciweavers

IH
2004
Springer
14 years 4 months ago
Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks
Abstract. This paper presents an implementation of the novel watermarking method proposed by Venkatesan, Vazirani, and Sinha in their recent paper A Graph Theoretic Approach to Sof...
Christian S. Collberg, Andrew Huntwork, Edward Car...
DRMTICS
2005
Springer
14 years 5 months ago
Algorithms to Watermark Software Through Register Allocation
Software security is a significant issue in the Internet age. In order to prevent software from piracy and unauthorized modification, many techniques have been developed. Softwar...
William Zhu, Clark D. Thomborson
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
14 years 5 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
PAISI
2007
Springer
14 years 5 months ago
Informed Recognition in Software Watermarking
Software watermarking is a technique to protect programs from piracy through embedding secret information into the programs. As software unauthorized use and modification are ubiq...
William Zhu