Computer Science
Watermarking
100%
Reverse Engineering
65%
Bytecode
49%
Obfuscation
49%
Code Transformation
37%
Control Flow
35%
Control-Flow Graph
31%
Search Engine
25%
Back End
25%
Compiler Construction
25%
Code Generator
25%
Software Model
25%
Information Hiding
22%
Data Structure
20%
Assemblers
18%
Internet Address
18%
Command-Line
18%
Target Machine
18%
Linkers
18%
Theoretic Approach
15%
Watermarking Algorithm
15%
secret message
15%
Software Piracy
15%
Software Development
12%
Software Engineering
12%
covert channel
12%
Practical Solution
12%
Asset Protection
12%
Cryptographic Asset
12%
Source Codes
12%
Malicious Attack
12%
Software Vendor
12%
Building System
12%
cloud system
12%
Executable Program
12%
Instruction Sequence
12%
Addressing Mode
12%
Register Set
12%
Protection Technique
12%
Web Search Engine
12%
Algorithm Designer
12%
Problem Identification
12%
Program Verification
12%
Compiler Writer
12%
Retargetable Compiler
12%
Obfuscated Code
12%
Abstract Machine
12%
Program Transformation
12%
Static Program Analysis
12%
Object-Oriented Languages
12%
Keyphrases
Watermarking
42%
Software Watermarking
37%
Obfuscation
29%
Software Model
25%
Algorithmic Search
25%
Untrusted
25%
Implementation Attacks
25%
Anti-reverse Engineering
22%
Java Programming
20%
Obfuscator
20%
Opaque Predicate
20%
Tamper-proof
18%
Malicious Attacks
18%
Malicious Modification
18%
Trusted Server
18%
Retargeting
16%
Resilient
15%
C Compiler
14%
Code Transformation
13%
Decompile
13%
Existing Techniques
12%
Watermark numbers
12%
Covert Channel
12%
Information Hiding
12%
Implementation Analysis
12%
Dynamic Graph
12%
Program Testing
12%
Software Theft
12%
Birthmark
12%
Program Path
12%
Path-based
12%
Search Tools
12%
Software System
12%
Executive
12%
Diversity Principle
12%
Adversarial Modeling
12%
Search Engine
12%
New Architecture
12%
Language-agnostic
12%
Native C
12%
Web Search Engines
12%
Visual Query Language
12%
Text Linguistics
12%
Privacy-preserving Cloud
12%
Dynamic Path
12%
Casual User
12%
Automatic Derivation
12%
Watermarking Algorithm
12%
Piracy
12%
Frequency-domain Implementation
12%