2007 |
12 | EE | Hongxia Jin,
Ginger Myles:
A technique for self-certifying tamper resistant software.
QoP 2007: 12-14 |
11 | EE | Christian S. Collberg,
Ginger Myles,
Michael Stepp:
An empirical study of Java bytecode programs.
Softw., Pract. Exper. 37(6): 581-641 (2007) |
2006 |
10 | EE | Ginger Myles,
Christian S. Collberg:
Software watermarking via opaque predicates: Implementation, analysis, and attacks.
Electronic Commerce Research 6(2): 155-171 (2006) |
9 | EE | Ginger Myles,
Stefan Nusser:
Content protection for games.
IBM Systems Journal 45(1): 119-144 (2006) |
2005 |
8 | EE | Hongxia Jin,
Ginger Myles,
Jeffery Lotspiech:
Towards Better Software Tamper Resistance.
ISC 2005: 417-430 |
7 | EE | Ginger Myles,
Hongxia Jin:
Self-validating Branch-Based Software Watermarking.
Information Hiding 2005: 342-356 |
6 | EE | Ginger Myles,
Christian S. Collberg:
K-gram based software birthmarks.
SAC 2005: 314-318 |
5 | EE | Ginger Myles,
Christian S. Collberg,
Zachary V. Heidepriem,
Armand Navabi:
The evaluation of two software watermarking algorithms.
Softw., Pract. Exper. 35(10): 923-938 (2005) |
2004 |
4 | EE | Ginger Myles,
Christian S. Collberg:
Detecting Software Theft via Whole Program Path Birthmarks.
ISC 2004: 404-415 |
3 | EE | Ginger Myles:
Using software watermarking to discourage piracy.
ACM Crossroads 10(3): 2 (2004) |
2003 |
2 | EE | Ginger Myles,
Christian S. Collberg:
Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks.
ICISC 2003: 274-293 |
1 | EE | Christian S. Collberg,
Ginger Myles,
Andrew Huntwork:
Sandmark--A Tool for Software Protection Research.
IEEE Security & Privacy 1(4): 40-49 (2003) |