5Collberg C, Thomborson C. Software Watermarking Models and Dynamic Embeddings[C]//Proc. of ACM SIGPLAN-SIGACT Symposium on Principles of Programming Language. New York, USA: ACM Press, 1999:311-324.
6Collberg C, Huntwork A, Carter E, et al. Graph Theoretic Software Watermark Implementation, Analysis, and Attacks[C]//Proc. of the 6th Workshop on Information Hiding. [S. 1.]: Springer, 2004:192-207.
7谭永坤.基于动态图的软件水印研究与实现[D].长春:吉林大学,2011.
8Chroni M, Nikolopoulos S D. Encoding Watermark Integers as Self-inverting Permutations[C]//Proc. of CompSysTech' 10. New York, USA: ACM Press, 2010: 125-130.
9Collberg C, Myles G; Huntwork A. Sandmark-A Tool for SoRware Protection Research[J]. Security and Privacy Archive, 2003, 1(4): 40-49.
10Collberg C S, Thomborson C D, Townsend G M. Dynamic Graph-based Software Fingerprinting[J]. ACM Transactions on Programming Languages and Systems, 2007, 29(6): 35-40.