Author of the publication

Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks.

, , , and . Information Hiding, volume 3200 of Lecture Notes in Computer Science, page 192-207. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection., and . Addison-Wesley Software Security Series Addison-Wesley, (2010)Software watermarking via opaque predicates: Implementation, analysis, and attacks., and . Electron. Commer. Res., 6 (2): 155-171 (2006)K-gram based software birthmarks., and . SAC, page 314-318. ACM, (2005)Graph-Based Approaches to Software Watermarking., , , and . WG, volume 2880 of Lecture Notes in Computer Science, page 156-167. Springer, (2003)A System for Graph-Based Visualization of the Evolution of Software., , , , and . SOFTVIS, page 77-86. ACM, (2003)Problem identification using program checking., and . Discret. Appl. Math., 144 (3): 270-280 (2004)Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning., , and . USENIX Security Symposium, page 661-678. USENIX Association, (2017)Detecting Software Theft via Whole Program Path Birthmarks., and . ISC, volume 3225 of Lecture Notes in Computer Science, page 404-415. Springer, (2004)Pinpointing and Hiding Surprising Fragments in an Obfuscated Program., , , and . PPREW@ACSAC, page 8:1-8:9. ACM, (2015)Code Obfuscation: Why is This Still a Thing?. CODASPY, page 173-174. ACM, (2018)