Detecting theft of Java applications via a static birthmark based on weighted stack patterns

Cited 20 time in webofscience Cited 0 time in scopus
  • Hit : 355
  • Download : 596
DC FieldValueLanguage
dc.contributor.authorLim, Hyun-ilko
dc.contributor.authorPark, Heewanko
dc.contributor.authorchoi, Seokwooko
dc.contributor.authorHan, Taisookko
dc.date.accessioned2010-02-03T02:20:10Z-
dc.date.available2010-02-03T02:20:10Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2008-09-
dc.identifier.citationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E91D, no.9, pp.2323 - 2332-
dc.identifier.issn0916-8532-
dc.identifier.urihttp://hdl.handle.net/10203/16440-
dc.description.abstractA software birthmark means the inherent characteristics of a program that can be used to identify the program. A comparison of such birthmarks facilitates the detection of software theft. In this paper, we propose a static Java birthmark based on a set of stack patterns, which reflect the characteristic of Java applications. A stack pattern denotes a sequence of bytecodes that share their operands through the operand stack. A weight scheme is used to balance the influence of each bytecode in a comparison of the birthmarks. We evaluate the proposed birthmark with respect to two properties required for a birthmark: credibility and resilience. The empirical results show that the proposed birthmark is highly credible and resilient to program transformation. We also compare the proposed birthmark with existing birthmarks, such as that of Tamada et al. and the k-gram birthmark. The experimental results show that the proposed birthmark is more stable than the birthmarks in terms of resilience to program transformation. Thus, the proposed birthmark can provide more reliable evidence of software theft when the software is modified by someone other than author.-
dc.description.sponsorshipThis research was supported by the MKE (Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Advancement). (IITA-2008-C1090-0801-0020)en
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherIEICE-Inst Electronics Information Communications Eng-
dc.subjectSOFTWARE THEFT-
dc.titleDetecting theft of Java applications via a static birthmark based on weighted stack patterns-
dc.typeArticle-
dc.identifier.wosid000259708700013-
dc.identifier.scopusid2-s2.0-67649319148-
dc.type.rimsART-
dc.citation.volumeE91D-
dc.citation.issue9-
dc.citation.beginningpage2323-
dc.citation.endingpage2332-
dc.citation.publicationnameIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorHan, Taisook-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorsoftware birthmark-
dc.subject.keywordAuthorsoftware theft detection-
dc.subject.keywordAuthorsoftware protection-
dc.subject.keywordAuthorJava bytecode-
dc.subject.keywordPlusSOFTWARE THEFT-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 20 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0