Author:
Jung Wontae,Yim Kangbin,Lee Kyungroul
Publisher
Springer International Publishing
Reference6 articles.
1. Jung, W., Lee, K.: Vulnerability analysis of intellectual property rights using reverse engineering: based on B software (2020)
2. Lee, J., Lee, K.: Vulnerability analysis of software piracy and reverse engineering: based on A software (2020)
3. Chandu V.P., Singh K., Baskaran R.: A Model for prevention of software piracy through secure distribution. In: Sobh, T. (eds.) Advances in Computer and Information Sciences and Engineering, pp. 251–255. Springer, Dordrecht (2008) https://doi.org/10.1007/978-1-4020-8741-7_45
4. Veeranna, N., Schafer, B.C.: Efficient behavioral intellectual properties source code obfuscation for high-level synthesis. In: 2017 18th IEEE Latin American Test Symposium (LATS), pp. 1–6 (2017)
5. Lee, S.-R.: A Design of illegal usage protection system of software through internet. J. Korea Soc. Comput. Inf. 6(4), 110–118 (2001)