Loading…
A Static Java Birthmark Based on Control Flow Edges
A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer if one program is a copy of another. In this paper, we propose a static birthmark based on the control flow edges in Java pr...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 420 |
container_issue | |
container_start_page | 413 |
container_title | |
container_volume | 1 |
creator | Hyun-il Lim Heewan Park Seokwoo Choi Taisook Han |
description | A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer if one program is a copy of another. In this paper, we propose a static birthmark based on the control flow edges in Java programs. Control flow edges can represent possible behaviors in program execution. Thus, a set of the control flow edges of a program can be used as a birthmark for that program. The similarity between two programs can then be calculated by finding pairs of similar behaviors of the control flow edges in the two birthmarks. The proposed birthmark is evaluated and compared with previous approaches in terms of credibility and resilience. Experimental results show that the proposed birthmark is more reliable than previous methods for detecting programs that are suspected to be copied. |
doi_str_mv | 10.1109/COMPSAC.2009.62 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5254233</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5254233</ieee_id><sourcerecordid>5254233</sourcerecordid><originalsourceid>FETCH-LOGICAL-i241t-e84b1ebb24f2d384d465c4740c9a0b024714bc16edb56a3c6a2fcb76619dfa8b3</originalsourceid><addsrcrecordid>eNotjktLAzEYAAMqWGvPHrzkD-z65b05bkPrg5YWquCt5LUaXbuyCYr_3oKe5jIMg9AVgZoQ0Ddms97uWlNTAF1LeoIuQEktmKLy-RRNQDGoGBHqHM1yfgMAoqU6yhPEWrwrtiSPH-yXxfM0ltcPO77juc0x4OGAzXAo49DjZT9840V4ifkSnXW2z3H2zyl6Wi4ezV212tzem3ZVJcpJqWLDHYnOUd7RwBoeuBSeKw5eW3BAuSLceSJjcEJa5qWlnXdKSqJDZxvHpuj6r5tijPvPMR3HfvaCCk4ZY7-zb0Oz</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A Static Java Birthmark Based on Control Flow Edges</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Hyun-il Lim ; Heewan Park ; Seokwoo Choi ; Taisook Han</creator><creatorcontrib>Hyun-il Lim ; Heewan Park ; Seokwoo Choi ; Taisook Han</creatorcontrib><description>A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer if one program is a copy of another. In this paper, we propose a static birthmark based on the control flow edges in Java programs. Control flow edges can represent possible behaviors in program execution. Thus, a set of the control flow edges of a program can be used as a birthmark for that program. The similarity between two programs can then be calculated by finding pairs of similar behaviors of the control flow edges in the two birthmarks. The proposed birthmark is evaluated and compared with previous approaches in terms of credibility and resilience. Experimental results show that the proposed birthmark is more reliable than previous methods for detecting programs that are suspected to be copied.</description><identifier>ISSN: 0730-3157</identifier><identifier>ISBN: 076953726X</identifier><identifier>ISBN: 9780769537269</identifier><identifier>DOI: 10.1109/COMPSAC.2009.62</identifier><language>eng</language><publisher>IEEE</publisher><subject>Application software ; Computer applications ; Computer industry ; Computer science ; Intellectual property ; Java ; Licenses ; program analysis ; Protection ; Resilience ; Security ; software birthmark ; software copyright ; software security</subject><ispartof>2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009, Vol.1, p.413-420</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5254233$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54555,54920,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5254233$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Hyun-il Lim</creatorcontrib><creatorcontrib>Heewan Park</creatorcontrib><creatorcontrib>Seokwoo Choi</creatorcontrib><creatorcontrib>Taisook Han</creatorcontrib><title>A Static Java Birthmark Based on Control Flow Edges</title><title>2009 33rd Annual IEEE International Computer Software and Applications Conference</title><addtitle>COMPSAC</addtitle><description>A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer if one program is a copy of another. In this paper, we propose a static birthmark based on the control flow edges in Java programs. Control flow edges can represent possible behaviors in program execution. Thus, a set of the control flow edges of a program can be used as a birthmark for that program. The similarity between two programs can then be calculated by finding pairs of similar behaviors of the control flow edges in the two birthmarks. The proposed birthmark is evaluated and compared with previous approaches in terms of credibility and resilience. Experimental results show that the proposed birthmark is more reliable than previous methods for detecting programs that are suspected to be copied.</description><subject>Application software</subject><subject>Computer applications</subject><subject>Computer industry</subject><subject>Computer science</subject><subject>Intellectual property</subject><subject>Java</subject><subject>Licenses</subject><subject>program analysis</subject><subject>Protection</subject><subject>Resilience</subject><subject>Security</subject><subject>software birthmark</subject><subject>software copyright</subject><subject>software security</subject><issn>0730-3157</issn><isbn>076953726X</isbn><isbn>9780769537269</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjktLAzEYAAMqWGvPHrzkD-z65b05bkPrg5YWquCt5LUaXbuyCYr_3oKe5jIMg9AVgZoQ0Ddms97uWlNTAF1LeoIuQEktmKLy-RRNQDGoGBHqHM1yfgMAoqU6yhPEWrwrtiSPH-yXxfM0ltcPO77juc0x4OGAzXAo49DjZT9840V4ifkSnXW2z3H2zyl6Wi4ezV212tzem3ZVJcpJqWLDHYnOUd7RwBoeuBSeKw5eW3BAuSLceSJjcEJa5qWlnXdKSqJDZxvHpuj6r5tijPvPMR3HfvaCCk4ZY7-zb0Oz</recordid><startdate>20090101</startdate><enddate>20090101</enddate><creator>Hyun-il Lim</creator><creator>Heewan Park</creator><creator>Seokwoo Choi</creator><creator>Taisook Han</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20090101</creationdate><title>A Static Java Birthmark Based on Control Flow Edges</title><author>Hyun-il Lim ; Heewan Park ; Seokwoo Choi ; Taisook Han</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i241t-e84b1ebb24f2d384d465c4740c9a0b024714bc16edb56a3c6a2fcb76619dfa8b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Application software</topic><topic>Computer applications</topic><topic>Computer industry</topic><topic>Computer science</topic><topic>Intellectual property</topic><topic>Java</topic><topic>Licenses</topic><topic>program analysis</topic><topic>Protection</topic><topic>Resilience</topic><topic>Security</topic><topic>software birthmark</topic><topic>software copyright</topic><topic>software security</topic><toplevel>online_resources</toplevel><creatorcontrib>Hyun-il Lim</creatorcontrib><creatorcontrib>Heewan Park</creatorcontrib><creatorcontrib>Seokwoo Choi</creatorcontrib><creatorcontrib>Taisook Han</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Hyun-il Lim</au><au>Heewan Park</au><au>Seokwoo Choi</au><au>Taisook Han</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A Static Java Birthmark Based on Control Flow Edges</atitle><btitle>2009 33rd Annual IEEE International Computer Software and Applications Conference</btitle><stitle>COMPSAC</stitle><date>2009-01-01</date><risdate>2009</risdate><volume>1</volume><spage>413</spage><epage>420</epage><pages>413-420</pages><issn>0730-3157</issn><isbn>076953726X</isbn><isbn>9780769537269</isbn><abstract>A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer if one program is a copy of another. In this paper, we propose a static birthmark based on the control flow edges in Java programs. Control flow edges can represent possible behaviors in program execution. Thus, a set of the control flow edges of a program can be used as a birthmark for that program. The similarity between two programs can then be calculated by finding pairs of similar behaviors of the control flow edges in the two birthmarks. The proposed birthmark is evaluated and compared with previous approaches in terms of credibility and resilience. Experimental results show that the proposed birthmark is more reliable than previous methods for detecting programs that are suspected to be copied.</abstract><pub>IEEE</pub><doi>10.1109/COMPSAC.2009.62</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0730-3157 |
ispartof | 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009, Vol.1, p.413-420 |
issn | 0730-3157 |
language | eng |
recordid | cdi_ieee_primary_5254233 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Application software Computer applications Computer industry Computer science Intellectual property Java Licenses program analysis Protection Resilience Security software birthmark software copyright software security |
title | A Static Java Birthmark Based on Control Flow Edges |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T19%3A03%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20Static%20Java%20Birthmark%20Based%20on%20Control%20Flow%20Edges&rft.btitle=2009%2033rd%20Annual%20IEEE%20International%20Computer%20Software%20and%20Applications%20Conference&rft.au=Hyun-il%20Lim&rft.date=2009-01-01&rft.volume=1&rft.spage=413&rft.epage=420&rft.pages=413-420&rft.issn=0730-3157&rft.isbn=076953726X&rft.isbn_list=9780769537269&rft_id=info:doi/10.1109/COMPSAC.2009.62&rft_dat=%3Cieee_6IE%3E5254233%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i241t-e84b1ebb24f2d384d465c4740c9a0b024714bc16edb56a3c6a2fcb76619dfa8b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5254233&rfr_iscdi=true |