SURVEY:SUMMARY:BUILD_DIFFICULTY[not_applicable, reasonable_effort, code_problematic or string] not_applicable SURVEY:SUMMARY:CLASSIFICATION[practical,theoretical,hardware] practical SURVEY:SUMMARY:CORRECT_CODE_LOCATION[string] Although the data-set is explicitly mentioned in the "data-set" section of our paper, you did not seem to have come across it.To get access to the data.set website, visit the URL provided in the paper (i.e. http://amnesiac.seclab.tuwien.ac.at) and use the following account:username: [redacted] password: [redacted] The data set exceeds 39GB compressed material and also includes the full analysis database as well as the results we could obtain for the single collected samples. SURVEY:SUMMARY:PUBLISHED_CODE[not_applicable, yes, no] yes SURVEY:SUMMARY:SAME_VERSION[not_applicable, yes, no_but_available, no_and_not_available] yes SURVEY:SUMMARY:STUDY_FOUND_CORRECT_CODE[not_applicable, yes, no] no SURVEY:AUTHOR1:BUILD_COMMENT[string] SURVEY:AUTHOR1:BUILD_DIFFICULTY[not_applicable, reasonable_effort, code_problematic or string] not_applicable SURVEY:AUTHOR1:BUILD_DIFFICULTY_COMMENT[string] none SURVEY:AUTHOR1:CLASSIFICATION[practical,theoretical,hardware] practical SURVEY:AUTHOR1:CLASSIFICATION_COMMENT[string] We practically collected (both manually as well as automatically) a high number of cracks and keygens for a wide range of software products as described in detail in our paper.We also created a dedicated website where the full data-set exceeding 39GB (compressed) of collected data can be publicly accessed and downloaded.In addition, also the complete analysis database with all analysis results is available on the website as well. Similarly, also the per-file results can be downloaded for each software product on the website.To get access to the website, visit the URL provided in the paper (i.e. http://amnesiac.seclab.tuwien.ac.at) and use the following account:username: [redacted] password: [redacted] Please note that the account is available to researchers as soon as they contact us. The reason for that is that the data set includes a high amount of malware and software piracy tools which we cannot make available without password protection for obvious reasons.I hope that this information resolves your assumption that our paper is merely THERETICAL and not actually backed by the collected data (and publicly available data-set). SURVEY:AUTHOR1:CORRECT_CODE_LOCATION[string] Although the data-set is explicitly mentioned in the "data-set" section of our paper, you did not seem to have come across it.To get access to the data.set website, visit the URL provided in the paper (i.e. http://amnesiac.seclab.tuwien.ac.at) and use the following account:username: ccs2012password: vanitycracksandmoneyThe data set exceeds 39GB compressed material and also includes the full analysis database as well as the results we could obtain for the single collected samples. SURVEY:AUTHOR1:PUBLIC_COMMENT[string] SURVEY:AUTHOR1:PUBLISHED_CODE[not_applicable, yes, no] yes SURVEY:AUTHOR1:SAME_VERSION[not_applicable, yes, no_but_available, no_and_not_available] yes SURVEY:AUTHOR1:SAME_VERSION_COMMENT[string] SURVEY:AUTHOR1:STUDY_FOUND_CORRECT_CODE[not_applicable, yes, no] no