|
[1] Products IDE, Borland Inc., “Borland Delphi 2006,” June 2006, http://www.borland.com/us/products/delphi/index.html. [2] MSDN, Microsoft Corp., “Visual Basic,” http://msdn.microsoft.com/vbasic/. [3] A. Kalinovsky, Covert Java: Techniques for Decompiling, Patching and Reverse Engineering. Sams, Indianapolis, Indiana, 2004. [4] Java, Sun Microsystems, Inc, http://java.sun.com/products/jdk/rmi/. [5] G. Booch., Object-Oriented Analysis and Design with applications. Addison-Wesley, 1994. [6] K Beck, W Cunningham, “A laboratory for teaching object oriented thinking,” in Proceedings of the 1989 ACM OOPSLA conference on object-oriented programming, 1989, pp. 1-6. [7] Grady Booch, James Rumbaugh, Ivar Jacobson, The Unified Modeling Language User Guide. Addison Wesley, 1998. [8] Kobryn, C., “Modeling Components and Frameworks with UML,” Journal of Communications of the ACM, vol. 43, pp. 31-38, October 2000. [9] Medvidovic, N., Rosenblum, D. S., Robbins, J. E., and Redmiles, D. F., “Modeling Software Architectures in the Unified Modeling Language,” Journal of Software Engineering and Methodology, vol. 11, pp. 2-57, January 2002. [10] Doug Rosenberg, Kendall Scott., Applying Use Case Driven Object Modeling with UML: An Annotated e-Commerce Example. Addison Wesley, 2001. [11] Grady Booch, James Rumbaugh, Ivar Jacobson, Analysis Patterns Reusable Object Models. Addison-Wesley, 2002 [12] Peter Coad, “Object-oriented patterns,” Journal of Communications of the ACM, vol. 35, pp. 153–159, September 1992. [13] Lionel Briand and Yvan Labiche, “A UML-based Approach to System Testing,” in Fourth International Conference on the Unified Modeling Language, October 2001, pp. 194-208. [14] UML, Object Management Group, June 2006,http://www.uml.org/. [15] D. Curran, N. J. Hurley, M. Ó Cinnéide, “Securing Java through Software Watermarking,” in Proceedings of the 2nd International Conference on Principles and Practice of Programming in Java, June 2003, pp. 145-148. [16] Christian Collberg and Clark Thomborson, “Software Watermarking: Models and Dynamic Embeddings,” in Principles of Programming Languages, 1999, pp. 311-324. [17] M. R Stytz, J. A Whittaker, “Software Protection -Security’s Last Stand,” Journal of IEEE Magazine of Security and Privacy, vol. 1, pp. 95-98 , January/February 2003. [18] Scott A. Moskowitz and Marc Cooperman, “Method for Strega-cipher Protection of Computer Code,” US Patent 5,745,569, January 1996. [19] Christian Collberg, Clark Thomborson., Gregg M. Townsend, “Dynamic Graph-Based Software Watermarking,” Tech. Rep. TR04-08, April 2004 [20] Christian Collberg, Clark Thomborson, and Douglas Low, “Breaking Abstractions and Unstructuring Data Structures,” In IEEE International Conference on Computer Languages, 1998, pp. 28-38. [21] Council for IBM Corporation, “Software birthmarks,” BCS Technology of Software Protection Special Interest Group. 1985. [22] Robert L. Davidson and Nathan Myhrvold, “Method and System for Generating and Auditing a Signature for A Computer Program,” US Patent 5,559,884, September 1996. [23] Robert L. Davidson, Nathan Myhrvold, Keith Randel Vogel, Gideon Andreas Yuval, Richard Shupak, and Norman Eugene Apperson, “Method and system for improving the locality of memory references during execution of a computer program,” US Patent 5,664,191,September 1997. [24] A. Monden, H. Iida, K. Matsumoto, Katsuro Inoue, and Koji Torii, “A Practical Method for Watermarking Java Programs,” in 24th Computer Software and Applications Conference, 2000, pp. 191-197. [25] Christian S. Collberg, “Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection,” Journal of Software Engineering, vol. 28, pp. 735-746, August 2002 [26] C. Collberg, E. Carter, S. Debray, A. Huntwork, C. Linn and M. Stepp, “Dynamic Path-Based Software Watermarking,” in Conference on Programming Language Design and Implementation, 2004, pp. 107-118. [27] Jens Palsberg, S. Krishnaswamy, Minseok Kwon, D. Ma, Qiuyun Shao, and Y. Zhang. “Experience with Software Watermarking,” in 16th Annual Computer Security Applications Conference, 2000, pp. 308. [28] Christian Collberg, Ginger Myles, and Andrew Huntwork, “SandMark — A Tool for Software Protection Research,” Journal of IEEE Magazine of Security and Privacy, vol. 1, pp. 40-49, July-August 2003. [29] SandMark, Computer Science Department of The University of Arizona, June 2006, http://www.cs.arizona.edu/sandmark/. [30] Kruchten,P., “The 4+1 View Model of Architecture,” IEEE Software, vol. 12, pp. 42-40, November 1995. [31] DJ Java Decompiler, June 2006, http://members.fortunecity.com/ neshkov/dj.html. [32] ProGuard , Sourceforge, June 2006, http://proguard.sourceforge.net/ [33] RetroGuard - Java Bytecode Obfuscation, Retrologic Systems, June 2006, http://www.retrologic.com/retroguard-main.html [34] Rational Rose XDE Developer, IBM Rational Software, June 2006, http://www-306.ibm.com/software/awdtools/developer/rosexde/.
|