Sciweavers

66 search results - page 3 / 14
» Algorithms to Watermark Software Through Register Allocation
Sort
View
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
13 years 11 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
COMPSYSTECH
2011
12 years 5 months ago
Encoding watermark numbers as cographs using self-inverting permutations
Abstract. In a software watermarking environment, several graph theoretic watermark methods encode the watermark values as graph structures and embed them in application programs. ...
Maria Chroni, Stavros D. Nikolopoulos
CC
2010
Springer
179views System Software» more  CC 2010»
14 years 2 days ago
Validating Register Allocation and Spilling
Abstract. Following the translation validation approach to highassurance compilation, we describe a new algorithm for validating a posteriori the results of a run of register alloc...
Silvain Rideau, Xavier Leroy
CC
2009
Springer
190views System Software» more  CC 2009»
14 years 5 months ago
SSA Elimination after Register Allocation
form uses a notational abstractions called -functions. These instructions have no analogous in actual machine instruction sets, and they must be replaced by ordinary instructions ...
Fernando Magno Quintão Pereira, Jens Palsbe...
ECR
2006
107views more  ECR 2006»
13 years 5 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg