Loading…

A Static Java Birthmark Based on Control Flow Edges

A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer if one program is a copy of another. In this paper, we propose a static birthmark based on the control flow edges in Java pr...

Full description

Saved in:
Bibliographic Details
Main Authors: Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Han
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 420
container_issue
container_start_page 413
container_title
container_volume 1
creator Hyun-il Lim
Heewan Park
Seokwoo Choi
Taisook Han
description A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer if one program is a copy of another. In this paper, we propose a static birthmark based on the control flow edges in Java programs. Control flow edges can represent possible behaviors in program execution. Thus, a set of the control flow edges of a program can be used as a birthmark for that program. The similarity between two programs can then be calculated by finding pairs of similar behaviors of the control flow edges in the two birthmarks. The proposed birthmark is evaluated and compared with previous approaches in terms of credibility and resilience. Experimental results show that the proposed birthmark is more reliable than previous methods for detecting programs that are suspected to be copied.
doi_str_mv 10.1109/COMPSAC.2009.62
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5254233</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5254233</ieee_id><sourcerecordid>5254233</sourcerecordid><originalsourceid>FETCH-LOGICAL-i241t-e84b1ebb24f2d384d465c4740c9a0b024714bc16edb56a3c6a2fcb76619dfa8b3</originalsourceid><addsrcrecordid>eNotjktLAzEYAAMqWGvPHrzkD-z65b05bkPrg5YWquCt5LUaXbuyCYr_3oKe5jIMg9AVgZoQ0Ddms97uWlNTAF1LeoIuQEktmKLy-RRNQDGoGBHqHM1yfgMAoqU6yhPEWrwrtiSPH-yXxfM0ltcPO77juc0x4OGAzXAo49DjZT9840V4ifkSnXW2z3H2zyl6Wi4ezV212tzem3ZVJcpJqWLDHYnOUd7RwBoeuBSeKw5eW3BAuSLceSJjcEJa5qWlnXdKSqJDZxvHpuj6r5tijPvPMR3HfvaCCk4ZY7-zb0Oz</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A Static Java Birthmark Based on Control Flow Edges</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Hyun-il Lim ; Heewan Park ; Seokwoo Choi ; Taisook Han</creator><creatorcontrib>Hyun-il Lim ; Heewan Park ; Seokwoo Choi ; Taisook Han</creatorcontrib><description>A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer if one program is a copy of another. In this paper, we propose a static birthmark based on the control flow edges in Java programs. Control flow edges can represent possible behaviors in program execution. Thus, a set of the control flow edges of a program can be used as a birthmark for that program. The similarity between two programs can then be calculated by finding pairs of similar behaviors of the control flow edges in the two birthmarks. The proposed birthmark is evaluated and compared with previous approaches in terms of credibility and resilience. Experimental results show that the proposed birthmark is more reliable than previous methods for detecting programs that are suspected to be copied.</description><identifier>ISSN: 0730-3157</identifier><identifier>ISBN: 076953726X</identifier><identifier>ISBN: 9780769537269</identifier><identifier>DOI: 10.1109/COMPSAC.2009.62</identifier><language>eng</language><publisher>IEEE</publisher><subject>Application software ; Computer applications ; Computer industry ; Computer science ; Intellectual property ; Java ; Licenses ; program analysis ; Protection ; Resilience ; Security ; software birthmark ; software copyright ; software security</subject><ispartof>2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009, Vol.1, p.413-420</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5254233$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54555,54920,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5254233$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Hyun-il Lim</creatorcontrib><creatorcontrib>Heewan Park</creatorcontrib><creatorcontrib>Seokwoo Choi</creatorcontrib><creatorcontrib>Taisook Han</creatorcontrib><title>A Static Java Birthmark Based on Control Flow Edges</title><title>2009 33rd Annual IEEE International Computer Software and Applications Conference</title><addtitle>COMPSAC</addtitle><description>A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer if one program is a copy of another. In this paper, we propose a static birthmark based on the control flow edges in Java programs. Control flow edges can represent possible behaviors in program execution. Thus, a set of the control flow edges of a program can be used as a birthmark for that program. The similarity between two programs can then be calculated by finding pairs of similar behaviors of the control flow edges in the two birthmarks. The proposed birthmark is evaluated and compared with previous approaches in terms of credibility and resilience. Experimental results show that the proposed birthmark is more reliable than previous methods for detecting programs that are suspected to be copied.</description><subject>Application software</subject><subject>Computer applications</subject><subject>Computer industry</subject><subject>Computer science</subject><subject>Intellectual property</subject><subject>Java</subject><subject>Licenses</subject><subject>program analysis</subject><subject>Protection</subject><subject>Resilience</subject><subject>Security</subject><subject>software birthmark</subject><subject>software copyright</subject><subject>software security</subject><issn>0730-3157</issn><isbn>076953726X</isbn><isbn>9780769537269</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjktLAzEYAAMqWGvPHrzkD-z65b05bkPrg5YWquCt5LUaXbuyCYr_3oKe5jIMg9AVgZoQ0Ddms97uWlNTAF1LeoIuQEktmKLy-RRNQDGoGBHqHM1yfgMAoqU6yhPEWrwrtiSPH-yXxfM0ltcPO77juc0x4OGAzXAo49DjZT9840V4ifkSnXW2z3H2zyl6Wi4ezV212tzem3ZVJcpJqWLDHYnOUd7RwBoeuBSeKw5eW3BAuSLceSJjcEJa5qWlnXdKSqJDZxvHpuj6r5tijPvPMR3HfvaCCk4ZY7-zb0Oz</recordid><startdate>20090101</startdate><enddate>20090101</enddate><creator>Hyun-il Lim</creator><creator>Heewan Park</creator><creator>Seokwoo Choi</creator><creator>Taisook Han</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20090101</creationdate><title>A Static Java Birthmark Based on Control Flow Edges</title><author>Hyun-il Lim ; Heewan Park ; Seokwoo Choi ; Taisook Han</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i241t-e84b1ebb24f2d384d465c4740c9a0b024714bc16edb56a3c6a2fcb76619dfa8b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Application software</topic><topic>Computer applications</topic><topic>Computer industry</topic><topic>Computer science</topic><topic>Intellectual property</topic><topic>Java</topic><topic>Licenses</topic><topic>program analysis</topic><topic>Protection</topic><topic>Resilience</topic><topic>Security</topic><topic>software birthmark</topic><topic>software copyright</topic><topic>software security</topic><toplevel>online_resources</toplevel><creatorcontrib>Hyun-il Lim</creatorcontrib><creatorcontrib>Heewan Park</creatorcontrib><creatorcontrib>Seokwoo Choi</creatorcontrib><creatorcontrib>Taisook Han</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Hyun-il Lim</au><au>Heewan Park</au><au>Seokwoo Choi</au><au>Taisook Han</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A Static Java Birthmark Based on Control Flow Edges</atitle><btitle>2009 33rd Annual IEEE International Computer Software and Applications Conference</btitle><stitle>COMPSAC</stitle><date>2009-01-01</date><risdate>2009</risdate><volume>1</volume><spage>413</spage><epage>420</epage><pages>413-420</pages><issn>0730-3157</issn><isbn>076953726X</isbn><isbn>9780769537269</isbn><abstract>A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer if one program is a copy of another. In this paper, we propose a static birthmark based on the control flow edges in Java programs. Control flow edges can represent possible behaviors in program execution. Thus, a set of the control flow edges of a program can be used as a birthmark for that program. The similarity between two programs can then be calculated by finding pairs of similar behaviors of the control flow edges in the two birthmarks. The proposed birthmark is evaluated and compared with previous approaches in terms of credibility and resilience. Experimental results show that the proposed birthmark is more reliable than previous methods for detecting programs that are suspected to be copied.</abstract><pub>IEEE</pub><doi>10.1109/COMPSAC.2009.62</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0730-3157
ispartof 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009, Vol.1, p.413-420
issn 0730-3157
language eng
recordid cdi_ieee_primary_5254233
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Application software
Computer applications
Computer industry
Computer science
Intellectual property
Java
Licenses
program analysis
Protection
Resilience
Security
software birthmark
software copyright
software security
title A Static Java Birthmark Based on Control Flow Edges
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T19%3A03%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20Static%20Java%20Birthmark%20Based%20on%20Control%20Flow%20Edges&rft.btitle=2009%2033rd%20Annual%20IEEE%20International%20Computer%20Software%20and%20Applications%20Conference&rft.au=Hyun-il%20Lim&rft.date=2009-01-01&rft.volume=1&rft.spage=413&rft.epage=420&rft.pages=413-420&rft.issn=0730-3157&rft.isbn=076953726X&rft.isbn_list=9780769537269&rft_id=info:doi/10.1109/COMPSAC.2009.62&rft_dat=%3Cieee_6IE%3E5254233%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i241t-e84b1ebb24f2d384d465c4740c9a0b024714bc16edb56a3c6a2fcb76619dfa8b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5254233&rfr_iscdi=true