You are on page 1of 2

BIBLIOGRAPHY

H. Chang and M. J. Atallah. Protecting software codes by guards Center for Education and Research in Information Assurance and Security & Arxan Technologies (CERIAS) Tech Report 2001-49

C. Collberg, Watermarking,Tamper-Proofing, and Obfuscation Tools for Software Protection IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 28, NO. 8, AUGUST 2002

A. Herzberg, S.S. Pinter. Public Protection of Software ACM Transactions on Computer Systems, Vol. 5, No. 4, November 1987, Pages Pages 371-393.

M. Jakobsson, M.K. Reiter, Discouraging Software Piracy Using Software Aging RSA Labs Bedford, MA, USA T. Sander (Ed.): DRM 2001, LNCS 2320, pp. 112, 2002

B. Fu, S. Aravalli andAbraham. Software Protection by Hardware and Obfuscation Dept. of Computer Science, TX 78539, USA

P. Wang. Tamper Resistance for Software Protectio Information and Communications University 2005

M. Mambo, T. Murayama and E. Okamoto. Tentative Approach to Constructing Tamper-Resistant Software

School of Information Science Japan Advanced Institute of Science and Technology l-l Asahidai Tatsunokuchi Nomi Ishikawa, 923-1211 Japan

S. Schrittwieser and S. Katzenbeisser. Code Obfuscation against Static and Dynamic Reverse Engineering Vienna University of Technology, Austria sebastian.schrittwieser@tuwien.ac.at Darmstadt University of Technology, Germany katzenbeisser@seceng.informatik.tu-darmstadt.de

S. Kent, Protecting Externally Supplied Software in Small Computers, Ph.D. thesis, M.I.T., September 1980.

http://globalstudy.bsa.org/2011/

http://www.abs-cbnnews.com/business/05/15/12/7-out-10-software-ph-piratedsurvey

You might also like