Learn More
  • Christian Collberg, Stephen Kobourov, Edward Carter, Clark Thomborson
  • 2003
In this paper, we discuss graph-theoretic approaches to software watermarking and fingerprinting. Software watermarking is used to discourage intellectual property theft and software fingerprinting is used to trace intellectual property copyright violations. We focus on two algorithms that encode information in software through the use of graph structures.(More)
This paper presents an implementation of the novel water-marking method proposed by Venkatesan, Vazirani, and Sinha in their recent paper A Graph Theoretic Approach to Software Watermarking. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified(More)
Software watermarking is a tool used to combat software piracy by embedding identifying information into a program. Most existing proposals for software watermarking have the shortcoming that the mark can be destroyed via fairly straightforward semantics-preserving code transformations. This paper introduces path-based watermarking, a new approach to(More)
External adherens junction-based cell-cell contacts involving E-cadherin interactions function to sense planar cell status and modulate epithelial cell proliferation through Hippo (Hpo) and non-canonical Wnt pathways signaling. We hypothesized these regulatory processes should also be sensitive to a similar cell-cell contact sensor associated with(More)
  • 1