[1]Business software alliance. Shadow market of pirated software grows to 63 billion[EB/OL]. [2012-04-11]. http://portal.bsa.org/globalpiracy2011/index.html. [2]COLLBERG C. Software watermarking: models and dynamic em-bedding[C]// Proceedings of Symposium on Principles of Programming Languages. New York: ACM Press, 1999: 311-324.[3]张立和, 杨义先, 钮心忻,等. 软件水印综述[J].软件学报, 2003, 14(2): 268-277.[4]MONDEN A, INOUE K. A practical method for watermarking java programs[C]// Proceedings of the 24th Computer Software and Applications Conference. Washington, DC: IEEE Computer Society, 2000: 191-197.[5]STERN J, HACHEZ G, KOEUNE F. Robust object watermarking: application to code[C]// Proceedings of the 1999 Information Hiding Workshop. Dresden: Springer, 1999: 368-378.[6]NAGRA J. Threading software watermarks[D]. Auckland: The University of Auckland, 2007.[7]COLLBERG C, HUNTWORK A, CARTER E, et al. Software watermarks: implementation, analysis, and attacks[J]. Information and Software Technology, 2009, 51(1):56-67. [8]PREDA M D, GIACOBAZZI R, VISENTINI E. Hiding software watermarks in loop structures[C]// Proceedings of the 15th International Symposium on Static Analysis. Heidelberg: Springer, 2008: 174-188.[9]COLLBERG C, THOMBORSON C. Watermarking, tamper-proof, and obfuscation - tools for software protection[J]. IEEE Transactions on Software Engineering, 2002, 28(8): 735-746.[10]COLLBERG C, THOMBORSON C, TOWNSEND G. Dynamic graph-based software fingerprinting[J]. ACM Transactions on Programming Languages and Systems, 2007, 29(6): 35-67.[11]KAMELA I, ALBLUWIB Q. A robust software watermarking for copyright protection[J]. Computers & Security, 2009, 28(6):395-409.[12]许金超, 曾国荪. 一种基于线程关系的软件水印算法[J]. 电子学报, 2012, 40(5): 891-896.[13]XU JC, ZENG G S. A software watermarking algorithm based on stack-state transition graph[C]// Proceeding of 4th International Conference on Network and System Security. Sydney: IEEE Computer Society, 2010:83-88.[14]芦斌,罗向阳,刘粉林.一种基于混沌的软件水印算法框架及实现[J].软件学报,2007, 18(2):351-360.[15]LAKHOTIA A, KUMAR E, VENABLE M. A method for detecting obfuscated calls in malicious binaries[J]. IEEE Transactions on Software Engineering, 2005, 31(11):955-968. |