吉林大学学报(工学版) ›› 2013, Vol. 43 ›› Issue (05): 1359-1366.doi: 10.7964/jdxbgxb201305034

• paper • Previous Articles     Next Articles

Software piracy detection based on birthmarks of multi-attribute features

LUO Yang-xia1,2, FANG Ding-yi1   

  1. 1. School of Information Science and Technology, Northwest University, Xi'an 710120, China;
    2. School of Information, Xi'an University of Finance and Economics, Xi'an 710100, China
  • Received:2013-01-09 Online:2013-09-01 Published:2013-09-01

Abstract:

To cope with the insufficiency of single-attribute features in anti-aggression and in detecting software theft, an algorithm to detect software piracy is proposed based on classification of multi-attribute features. In order to detect software piracy with better accuracy and lower overhead, after semantics-preserving transformations of the software, the algorithm extracts features by the following steps: disassembly analysis, extraction and selection, segmentation and metrics, construction of classifier according to similarities. The algorithm is described and its implementation is depicted. Experiment results show that the algorithm is feasible in improving the robustness and credibility of identification, and resistance to attacks. It overperforms existing similar methods.

Key words: computer application, multi-attribute features, classification, feature metrics

CLC Number: 

  • TP309

[1] Aiken A, Schleimer S, Auslander J, et al. Method and apparatus for indexing document content and content comparison with World Wide Web search service[P]. US Patents:6757675,2004-06-29.

[2] University of California-Berkeley. Moss: a system for detecting software plagiarism[M/OL].[2005-09-22] www cs berkeley edu/aiken/moss html.

[3] Tamada H, Nakamura M, Monden A, et al. Design and evaluation of birthmarks for detecting theft of java programs[C]//Proceedings of the International Conference on Software Engineering. Austria:ACTA,2004.

[4] Myles G, Collberg C. Detecting software theft via whole program path birthmarks[J].Information Security, 2004, 3225(9): 404-415.

[5] Tamada H, Okamoto K, Nakamura M, et al. Dynamic software birthmarks to detect the theft of win-dows applications[C]//Proceedings of the 8th International Symposium on Future Software Technology, Xi'an, China,2004.

[6] Park Heewan, Lim Hyun-Il, Choi Seokwoo, et al. A static java birthmark based on oper and stack behaviors[C]//Proceedings of the 2008 International Conference on Information Security and Assurance, Washington, USA,2008.

[7] Myles G, Collberg C. K-gram based software birthmarks[C]//Proceedings of the the Symposium on Applied Computing New York, USA,2005.

[8] Lim H, Park H, Choi S, et al. A static java birthmark based on control flow edges[C]//Proceedings of the IEEE 33rd Computer Software and Applications Conference, 2009.

[9] Zhou X, Sun X, Sun G, et al. A combined static and dynamic software birthmark based on component dependence graph[C]//Proceedings of the IEEE 2008 Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China,2008.

[10] 赵玉洁, 房鼎益, 顾元祥, 等. 代码混淆算法有效性评估[J].软件学报, 2012, 23(3): 700-711. Zhao Yu-jie, Fang Ding-yi, Gu Yuan-xiang,et al. Evaluation of code obfuscating transformation[J].Chinese Journal of Software, 2012, 23(3): 700-711.

[11] Proietti M, Pettorossi A. Semantics preserving transformation rules for Prolog[C]//Proceedings of Partial Evaluation and Semantics-based Program Evaluation,ACM,1991.

[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] DONG Sa, LIU Da-you, OUYANG Ruo-chuan, ZHU Yun-gang, LI Li-na. Logistic regression classification in networked data with heterophily based on second-order Markov assumption [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1571-1577.
[8] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[9] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[10] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[11] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[12] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[13] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[14] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[15] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!