DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lim, Hyun-il | ko |
dc.contributor.author | Park, Heewan | ko |
dc.contributor.author | Choi, Seokwoo | ko |
dc.contributor.author | Han, Taisook | ko |
dc.date.accessioned | 2010-02-03T05:23:40Z | - |
dc.date.available | 2010-02-03T05:23:40Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2009-09 | - |
dc.identifier.citation | INFORMATION AND SOFTWARE TECHNOLOGY, v.51, no.9, pp.1338 - 1350 | - |
dc.identifier.issn | 0950-5849 | - |
dc.identifier.uri | http://hdl.handle.net/10203/16447 | - |
dc.description.abstract | A software birthmark refers to the inherent characteristics of a program that can be used to identify the program. In this paper, a method for detecting the theft of Java programs through a static software birthmark is proposed that is based on the control flow information. The control flow information shows the structural characteristics and the possible behaviors during the execution of program. Flow paths (FP) and behaviors in Java programs are formally described here, and a set of behaviors of FPs is used as a software birthmark. The similarity is calculated by matching the pairs of similar behaviors from two birthmarks. Experiments centered on the proposed birthmark with respect to precision and recall. The performance was evaluated by analyzing the F-measure curves. The experimental results show that the proposed birthmark is a more effective measure compared to earlier approaches for detecting copied programs. even in cases where such programs are aggressively modified. (C) 2009 Elsevier B.V. All rights reserved. | - |
dc.description.sponsorship | This work was supported by the Korea Science and Engineering Foundation (KOSEF) grant funded by the Korea government (MEST) (R01-2008-000-11856-0). | en |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | Elsevier Science Bv | - |
dc.title | A method for detecting the theft of Java programs through analysis of the control flow information | - |
dc.type | Article | - |
dc.identifier.wosid | 000268561700005 | - |
dc.identifier.scopusid | 2-s2.0-67649306203 | - |
dc.type.rims | ART | - |
dc.citation.volume | 51 | - |
dc.citation.issue | 9 | - |
dc.citation.beginningpage | 1338 | - |
dc.citation.endingpage | 1350 | - |
dc.citation.publicationname | INFORMATION AND SOFTWARE TECHNOLOGY | - |
dc.identifier.doi | 10.1016/j.infsof.2009.04.011 | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Han, Taisook | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Software birthmark | - |
dc.subject.keywordAuthor | Software copyright protection | - |
dc.subject.keywordAuthor | Software theft detection | - |
dc.subject.keywordAuthor | Java bytecode analysis | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.