Detecting theft of Java applications via a static birthmark based on weighted stack patterns

Cited 20 time in webofscience Cited 0 time in scopus
  • Hit : 356
  • Download : 596
A software birthmark means the inherent characteristics of a program that can be used to identify the program. A comparison of such birthmarks facilitates the detection of software theft. In this paper, we propose a static Java birthmark based on a set of stack patterns, which reflect the characteristic of Java applications. A stack pattern denotes a sequence of bytecodes that share their operands through the operand stack. A weight scheme is used to balance the influence of each bytecode in a comparison of the birthmarks. We evaluate the proposed birthmark with respect to two properties required for a birthmark: credibility and resilience. The empirical results show that the proposed birthmark is highly credible and resilient to program transformation. We also compare the proposed birthmark with existing birthmarks, such as that of Tamada et al. and the k-gram birthmark. The experimental results show that the proposed birthmark is more stable than the birthmarks in terms of resilience to program transformation. Thus, the proposed birthmark can provide more reliable evidence of software theft when the software is modified by someone other than author.
Publisher
IEICE-Inst Electronics Information Communications Eng
Issue Date
2008-09
Language
English
Article Type
Article
Keywords

SOFTWARE THEFT

Citation

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E91D, no.9, pp.2323 - 2332

ISSN
0916-8532
URI
http://hdl.handle.net/10203/16440
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 20 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0