Author of the publication

Exploiting number theory for dynamic software watermarking.

, and . J. Comput. Virol. Hacking Tech., 20 (1): 41-51 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Grand Challenge in Metamorphic Analysis.. ICISTM, volume 285 of Communications in Computer and Information Science, page 439-444. Springer, (2012)Completeness Refinement in Abstract Symbolic Trajectory Evaluation.. SAS, volume 3148 of Lecture Notes in Computer Science, page 38-52. Springer, (2004)Hiding Software Watermarks in Loop Structures., , and . SAS, volume 5079 of Lecture Notes in Computer Science, page 174-188. Springer, (2008)A deep learning approach to program similarity., , and . MASES@ASE, page 26-35. ACM, (2018)On-chip system call tracing: A feasibility study and open prototype., , , , and . CNS, page 73-81. IEEE, (2016)Monotonicity and the Precision of Program Analysis., , , and . Proc. ACM Program. Lang., 8 (POPL): 1629-1662 (January 2024)Active Android malware analysis: an approach based on stochastic games., , , , and . SSPREW@ACSAC, page 5:1-5:10. ACM, (2016)Semantics-based code obfuscation by abstract interpretation., and . Journal of Computer Security, 17 (6): 855-908 (2009)Opaque Predicates Detection by Abstract Interpretation., , , and . AMAST, volume 4019 of Lecture Notes in Computer Science, page 81-95. Springer, (2006)Software Watermarking: A Semantics-based Approach., and . NSAD@SAS, volume 331 of Electronic Notes in Theoretical Computer Science, page 71-85. Elsevier, (2016)