{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:28:36Z","timestamp":1725733716100},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/imis.2013.159","type":"proceedings-article","created":{"date-parts":[[2013,9,25]],"date-time":"2013-09-25T22:05:29Z","timestamp":1380146729000},"page":"129-134","source":"Crossref","is-referenced-by-count":11,"title":["A Static Birthmark for MS Windows Applications Using Import Address Table"],"prefix":"10.1109","author":[{"given":"JongCheon","family":"Choi","sequence":"first","affiliation":[]},{"given":"YongMan","family":"Han","sequence":"additional","affiliation":[]},{"given":"Seong-je","family":"Cho","sequence":"additional","affiliation":[]},{"given":"HaeYoung","family":"Yoo","sequence":"additional","affiliation":[]},{"given":"Jinwoon","family":"Woo","sequence":"additional","affiliation":[]},{"given":"Minkyu","family":"Park","sequence":"additional","affiliation":[]},{"given":"Youngsang","family":"Song","sequence":"additional","affiliation":[]},{"given":"Lawrence","family":"Chung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066753"},{"key":"2","first-page":"569","article-title":"Design and evaluation of birthmarks for detecting theft of java programs","author":"tamada","year":"2004","journal-title":"Proc IASTED International Conference on Software Engineering (IASTED SE 2004)"},{"journal-title":"Microsoft Portable Executable and Common Object File Format Specification Revision 8 2","year":"2010","key":"10"},{"journal-title":"Business Software Alliance 2011 BSA Global Software Piracy Study 9th Edition","year":"2012","key":"1"},{"journal-title":"Proceedings of the 8th Workshop on Software Reengineering","article-title":"Detecting software theft with api call sequence sets","year":"2006","author":"schuler","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.24"},{"journal-title":"Proc International Symposium on Future Software Technology 2004 (ISFST 2004)","article-title":"Dynamic software birthmarks to detect the theft of windows applications","year":"2004","author":"tamada","key":"5"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-30144-8_34","article-title":"Detecting software theft via whole program path birthmarks","author":"myles","year":"2004","journal-title":"Information Security Conference"},{"journal-title":"Software Theft Detection Through Program Identification","year":"2006","author":"myles","key":"9"},{"journal-title":"The 12th Asian Computing Science Conference (ASIAN)","article-title":"A static birthmark of binary executables based on api call structure","year":"2007","author":"choi","key":"8"}],"event":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)","start":{"date-parts":[[2013,7,3]]},"location":"Taichung, Taiwan","end":{"date-parts":[[2013,7,5]]}},"container-title":["2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6603432\/6603600\/06603661.pdf?arnumber=6603661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T22:34:40Z","timestamp":1498084480000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6603661\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/imis.2013.159","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}