吉林大学学报(工学版) ›› 2017, Vol. 47 ›› Issue (6): 1894-1902.doi: 10.13229/j.cnki.jdxbgxb201706030

• Orginal Article • Previous Articles     Next Articles

Software recognition based on features of data dependency

LUO Yang-xia1, 2, GUO Ye1   

  1. 1.School of Information, Xi'an University of Finance and Economics, Xi'an 710100, China;
    2.China(Xi'an)Institute for Silk Road Research, Xi'an 710100, China
  • Received:2016-06-27 Online:2017-11-20 Published:2017-11-20

Abstract: The software features based on data stream slice are studied, and a new algorithm and evaluation system are proposed for software identification. The definitions about the algorithm, such as data flow, relationship between topological sort, similarity comparison, etc., are given. The key steps of the algorithm are elaborated, including the data dependencies, the structure and reduction of the data dependency graph, the process of relationship topology sorting. Finally, the algorithm and data flow evaluation system of software feature are implemented. System implementation and experiment analysis demonstrate that the research data analysis and theoretical derivation mutually authenticate. The proposed algorithm and evaluation system has theoretical and practical significance for promotion research of software recognition based on software features.

Key words: computer software, software protection, software feature, data flow, data dependency, feature recognition

CLC Number: 

  • TP309
[1] 伍之昂,庄毅,王有权,等. 基于特征选择的推荐系统托攻击检测算法[J]. 电子学报,2012,40(8):1687-1694.
Wu Zhi-ang, Zhuang Yi,Wang You-quan,et al. Shilling attack detection based on feature selection for recommendation systems[J]. Acta Electronica Sinica,2012,40(8):1687-1694.
[2] 惠战伟,黄松嵇,孟雨. 基于程序特征谱整数溢出错误定位技术研究[J]. 计算机学报,2012,35(10):2206-2217.
Hui Zhan-wei, Huang Song-ji, Meng Yu. Research on spectra-based integer bug localization[J] Chinese Journal of Computers,2012,35(10):2206-2217.
[3] Park H, Choi S, Lim H, et al. Detecting java theft based on static API trace birthmark[C]//3rd International Workshop on Advances in Information and Computer Security, Kagawa, Japan,2008:121-135.
[4] Xie X, Liu F, Lu B, et al. A software birthmark based on weighted n -gram[C]//Proceedings of the Intelligent Computing and Intelligent Systems (ICIS), Zhengzhou,China,2010:400-405.
[5] Chan P P F, Hui L C K, Yiu S M. Dynamic software birthmark for Java based on heap memory analysis[C]//IFIP International Conference on Communications and Multimedia Security, Ghent, Belgium,2011:94-107.
[6] Myles G, Collberg C. Detecting software theft via whole program path birthmarks[C]//International Conference on Information Security, Palo Alto, USA,2004:27-29.
[7] 赵玉洁,房鼎益,顾元祥,等. 代码混淆算法有效性评估[J].软件学报,2012,23(3):700-711.
Zhao Yu-jie, Fang Ding-yi, Gu Yuan-xiang,et al. Evaluation of code obfuscating transformation[J]. Chinese Journal of Software,2012,23(3):700-711.
[8] Sartipi K, Safyallah H. Dynamic knowledge extraction from software systems using sequential pattern mining[J]. International Journal of Software Engineering and Knowledge Engineering,2010,20(6):100-108.
[9] Nagra J, Thomborsonm C. Threading software watermarks[C]//International Workshop on Information Hiding, Toronto,Canada,2004:208-223.
[10] 罗养霞. 基于多属性特征胎记的软件盗版检测[J]. 吉林大学学报:工学版,2013,43(5):1359-1366.
Luo Yang-xia. Software piracy detection based on birthmarks of multi-attribute features[J]. Journal of Jilin University(Engineering and Technology Edition),2013,43(5):1359-1366.
[1] MA Jian, FAN Jian-ping, LIU Feng, LI Hong-hui. The evolution model of objective-oriented software system [J]. 吉林大学学报(工学版), 2018, 48(2): 545-550.
[2] YING Huan, WANG Dong-hui, WU Cheng-gang, WANG Zhe, TANG Bo-wen, LI Jian-jun. Efficient deterministic replay technique on commodity system environment [J]. 吉林大学学报(工学版), 2017, 47(1): 208-217.
[3] LI Yong, HUANG Zhi-qiu, WANG Yong, FANG Bing-wu. New approach of cross-project defect prediction based on multi-source data [J]. 吉林大学学报(工学版), 2016, 46(6): 2034-2041.
[4] WANG Nian-bin, ZHU Guan-wen, ZHOU Lian-ke, WANG Hong-wei. Novel dataspace index for efficient processing of path query [J]. 吉林大学学报(工学版), 2016, 46(3): 911-916.
[5] TE Ri-gen, JIANG Sheng, LI Xiong-fei, LI Jun. Document compression scheme based on integer data [J]. 吉林大学学报(工学版), 2016, 46(1): 228-234.
[6] CHEN Peng-fei, TIAN Di, YANG Guang. Design and implementation of LIBS software based on MVC architecture [J]. 吉林大学学报(工学版), 2016, 46(1): 242-245.
[7] LIU Lei, WANG Yan-yan, SHEN Chun, LI Yu-xiang, LIU Lei. Performance portable GPU parallel optimization technique on Bellman-Ford algorithm [J]. 吉林大学学报(工学版), 2015, 45(5): 1559-1564.
[8] FENG Xiao-ning, WANG Zhuo, ZHANG Xu. Formal method for routing protocol of WSN based on L-π calculus [J]. 吉林大学学报(工学版), 2015, 45(5): 1565-1571.
[9] LI Ming-zhe, WANG Jin-lin, CHEN Xiao, CHEN Jun. Architecture model of streaming media applications on network processors(VPL) [J]. 吉林大学学报(工学版), 2015, 45(5): 1572-1580.
[10] WANG Ke-chao, WANG Tian-tian, SU Xiao-hong, MA Pei-jun. Plagiarism detection in student programs based on frequent closed sequence mining [J]. 吉林大学学报(工学版), 2015, 45(4): 1260-1265.
[11] HUANG Hong-tao,WANG Jing,YE Hai-zhi,HUANG Shao-bin. Lazy slicing based method for verifying linear temporal logic property [J]. 吉林大学学报(工学版), 2015, 45(1): 245-251.
[12] FAN Da-juan, HUANG Zhi-qiu, XIAO Fang-xiong, ZHU Yi, WANG Jin. Compatibility analysis and adaptor generation for multi-service interaction [J]. 吉林大学学报(工学版), 2014, 44(4): 1094-1103.
[13] HE Qin-lu, LI Zhan-huai, WANG Le-xiao, WANG Rui. Testing technology for aggregate bandwidth of cloud storage system [J]. 吉林大学学报(工学版), 2014, 44(4): 1104-1111.
[14] LIU Guo-qi, LIU Hui, GAO Yu, LIU Ying, ZHU Zhi-liang. Resource dynamic pricing strategy based on utility in cloud computing [J]. 吉林大学学报(工学版), 2013, 43(06): 1631-1637.
[15] DENG Hui, WU Jin-zhao. Approximate bisimulation for linear semi-algebraic transition systems [J]. 吉林大学学报(工学版), 2013, 43(04): 1052-1058.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!