Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000
DOI: 10.1109/cmpsac.2000.884716
|View full text |Cite
|
Sign up to set email alerts
|

A practical method for watermarking Java programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
44
0

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 69 publications
(44 citation statements)
references
References 4 publications
0
44
0
Order By: Relevance
“…However, the structure of the leaf nodes is similar to the structure of the non-leaf node 2 . The proposed watermarking algorithms do not differentiate between leaf and non-leaf nodes and treat them similarly.…”
Section: Location Of the Watermarkmentioning
confidence: 96%
“…However, the structure of the leaf nodes is similar to the structure of the non-leaf node 2 . The proposed watermarking algorithms do not differentiate between leaf and non-leaf nodes and treat them similarly.…”
Section: Location Of the Watermarkmentioning
confidence: 96%
“…However, existing hard/firm IP protection techniques cannot be directly used to prevent designers from losing control of their IPs once HDL source codes are released. On the other hand, HDL code is different from other programming languages like C/C++ and Java [1,13,18]. Current software protection is not applicable for HDL code protection due to the following two reasons: 1) design reuse methodology requires HDL code to be developed and documented following industrial standards; 2) there are no executables associated with HDL programs.…”
Section: Software Watermarking and Obfuscatingmentioning
confidence: 99%
“…Therefore, it may be used for our objective. Watermarking is basically used to embed stealthy information in a piece of software, such as a software developer's copyright notation or a unique identifier of software, in a static manner [22]- [24], or in a dynamic manner [25]- [27]. Unfortunately, watermarking is not always feasible because it requires software developers to embed a watermark before releasing the software.…”
Section: Related Workmentioning
confidence: 99%