DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lim, Hyun-il | ko |
dc.contributor.author | Park, Heewan | ko |
dc.contributor.author | choi, Seokwoo | ko |
dc.contributor.author | Han, Taisook | ko |
dc.date.accessioned | 2010-02-03T02:20:10Z | - |
dc.date.available | 2010-02-03T02:20:10Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2008-09 | - |
dc.identifier.citation | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E91D, no.9, pp.2323 - 2332 | - |
dc.identifier.issn | 0916-8532 | - |
dc.identifier.uri | http://hdl.handle.net/10203/16440 | - |
dc.description.abstract | A software birthmark means the inherent characteristics of a program that can be used to identify the program. A comparison of such birthmarks facilitates the detection of software theft. In this paper, we propose a static Java birthmark based on a set of stack patterns, which reflect the characteristic of Java applications. A stack pattern denotes a sequence of bytecodes that share their operands through the operand stack. A weight scheme is used to balance the influence of each bytecode in a comparison of the birthmarks. We evaluate the proposed birthmark with respect to two properties required for a birthmark: credibility and resilience. The empirical results show that the proposed birthmark is highly credible and resilient to program transformation. We also compare the proposed birthmark with existing birthmarks, such as that of Tamada et al. and the k-gram birthmark. The experimental results show that the proposed birthmark is more stable than the birthmarks in terms of resilience to program transformation. Thus, the proposed birthmark can provide more reliable evidence of software theft when the software is modified by someone other than author. | - |
dc.description.sponsorship | This research was supported by the MKE (Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Advancement). (IITA-2008-C1090-0801-0020) | en |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | IEICE-Inst Electronics Information Communications Eng | - |
dc.subject | SOFTWARE THEFT | - |
dc.title | Detecting theft of Java applications via a static birthmark based on weighted stack patterns | - |
dc.type | Article | - |
dc.identifier.wosid | 000259708700013 | - |
dc.identifier.scopusid | 2-s2.0-67649319148 | - |
dc.type.rims | ART | - |
dc.citation.volume | E91D | - |
dc.citation.issue | 9 | - |
dc.citation.beginningpage | 2323 | - |
dc.citation.endingpage | 2332 | - |
dc.citation.publicationname | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Han, Taisook | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | software birthmark | - |
dc.subject.keywordAuthor | software theft detection | - |
dc.subject.keywordAuthor | software protection | - |
dc.subject.keywordAuthor | Java bytecode | - |
dc.subject.keywordPlus | SOFTWARE THEFT | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.