Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Watermarking, tamper-proofing, and obfuscation-tools for software protection
We identify three types of attack on the intellectual property contained in software and three
corresponding technical defenses. A defense against reverse engineering is obfuscation, a …
corresponding technical defenses. A defense against reverse engineering is obfuscation, a …
A robustness-assured white-box watermark in neural networks
Recently, stealing highly-valuable and large-scale deep neural network (DNN) models
becomes pervasive. The stolen models may be re-commercialized, eg, deployed in …
becomes pervasive. The stolen models may be re-commercialized, eg, deployed in …
Software watermarking: Progress and challenges
In this paper, we present a brief survey on software watermarking methods that explains the
prospects and constraints of most software watermarking algorithms. We introduce a …
prospects and constraints of most software watermarking algorithms. We introduce a …
Detecting software theft via whole program path birthmarks
G Myles, C Collberg - International Conference on Information Security, 2004 - Springer
A software birthmark is a unique characteristic of a program that can be used as a software
theft detection technique. In this paper we present and empirically evaluate a novel …
theft detection technique. In this paper we present and empirically evaluate a novel …
Oblivious hashing: A stealthy software integrity verification primitive
We describe a novel software verification primitive called Oblivious Hashing. Unlike
previous techniques that mainly verify the static shape of code, this primitive allows implicit …
previous techniques that mainly verify the static shape of code, this primitive allows implicit …
Dynamic path-based software watermarking
Software watermarking is a tool used to combat software piracy by embedding identifying
information into a program. Most existing proposals for software watermarking have the …
information into a program. Most existing proposals for software watermarking have the …
Sandmark-a tool for software protection research
C Collberg, GR Myles, A Huntwork - IEEE security & privacy, 2003 - ieeexplore.ieee.org
Sandmark is a tool that measures the effectiveness of software-based methods for protecting
software from piracy, tampering, and reverse engineering. The Sandmark team's goal is to …
software from piracy, tampering, and reverse engineering. The Sandmark team's goal is to …
Software birthmark design and estimation: a systematic literature review
The concept of software birthmark is developed for the detection of theft and piracy in
software applications. The originality of software can be evaluated by comparing software …
software applications. The originality of software can be evaluated by comparing software …
[PDF][PDF] A method for watermarking java programs via opaque predicates
G Arboit - The Fifth International Conference on Electronic …, 2002 - academia.edu
In this paper, we present a method for watermarking Java programs that uses opaque
predicates, improving upon those presented in two previous papers [13, 9]. We present two …
predicates, improving upon those presented in two previous papers [13, 9]. We present two …
Indexing information for data forensics
We introduce novel techniques for organizing the indexing structures of how data is stored
so that alterations from an original version can be detected and the changed values …
so that alterations from an original version can be detected and the changed values …