File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Dynamic software birthmark for java based on heap memory analysis

TitleDynamic software birthmark for java based on heap memory analysis
Authors
KeywordsCode Theft Detection
Java
Software Birthmark
Software Protection
Issue Date2011
PublisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/
Citation
The 12th Joint IFIP TC6 and TC11 International Conference on Communications and Multimedia Security (CMS 2011), Ghent, Belgium, 19-21 October 2011. In Lecture Notes in Computer Science, 2011, v. 7025, p. 94-107 How to Cite?
AbstractCode theft has been a serious threat to the survival of the software industry. A dynamic software birthmark can help detect code theft by comparing the intrinsic characteristics of two programs extracted during their execution. We propose a dynamic birthmark system for Java based on the object reference graph. To the best of our knowledge, it is the first dynamic software birthmark making use of the heap memory. We evaluated our birthmark using 25 large-scale programs with most of them of tens of megabytes in size. Our results show that it is effective in detecting partial code theft. No false positive or false negative were found. More importantly, the birthmark remained intact even after the testing programs were obfuscated by the state-of-the-art Allatori obfuscator. These promising results reflect that our birthmark is ready for practical use. © 2011 Springer-Verlag.
DescriptionLecture Notes in Computer Science, Vol.7025 is the conference proceedings of the CMS 2011
Persistent Identifierhttp://hdl.handle.net/10722/152014
ISBN
ISSN
2005 Impact Factor: 0.402
2015 SCImago Journal Rankings: 0.252
References

 

DC FieldValueLanguage
dc.contributor.authorChan, PPFen_US
dc.contributor.authorHui, LCKen_US
dc.contributor.authorYiu, SMen_US
dc.date.accessioned2012-06-26T06:32:26Z-
dc.date.available2012-06-26T06:32:26Z-
dc.date.issued2011en_US
dc.identifier.citationThe 12th Joint IFIP TC6 and TC11 International Conference on Communications and Multimedia Security (CMS 2011), Ghent, Belgium, 19-21 October 2011. In Lecture Notes in Computer Science, 2011, v. 7025, p. 94-107en_US
dc.identifier.isbn9783642247118-
dc.identifier.issn0302-9743en_US
dc.identifier.urihttp://hdl.handle.net/10722/152014-
dc.descriptionLecture Notes in Computer Science, Vol.7025 is the conference proceedings of the CMS 2011-
dc.description.abstractCode theft has been a serious threat to the survival of the software industry. A dynamic software birthmark can help detect code theft by comparing the intrinsic characteristics of two programs extracted during their execution. We propose a dynamic birthmark system for Java based on the object reference graph. To the best of our knowledge, it is the first dynamic software birthmark making use of the heap memory. We evaluated our birthmark using 25 large-scale programs with most of them of tens of megabytes in size. Our results show that it is effective in detecting partial code theft. No false positive or false negative were found. More importantly, the birthmark remained intact even after the testing programs were obfuscated by the state-of-the-art Allatori obfuscator. These promising results reflect that our birthmark is ready for practical use. © 2011 Springer-Verlag.en_US
dc.languageengen_US
dc.publisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/en_US
dc.relation.ispartofLecture Notes in Computer Scienceen_US
dc.subjectCode Theft Detectionen_US
dc.subjectJavaen_US
dc.subjectSoftware Birthmarken_US
dc.subjectSoftware Protectionen_US
dc.titleDynamic software birthmark for java based on heap memory analysisen_US
dc.typeConference_Paperen_US
dc.identifier.emailHui, LCK:hui@cs.hku.hken_US
dc.identifier.emailYiu, SM:smyiu@cs.hku.hken_US
dc.identifier.authorityHui, LCK=rp00120en_US
dc.identifier.authorityYiu, SM=rp00207en_US
dc.description.naturelink_to_subscribed_fulltexten_US
dc.identifier.doi10.1007/978-3-642-24712-5_8en_US
dc.identifier.scopuseid_2-s2.0-80053611105en_US
dc.identifier.hkuros211621-
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-80053611105&selection=ref&src=s&origin=recordpageen_US
dc.identifier.volume7025en_US
dc.identifier.spage94en_US
dc.identifier.epage107en_US
dc.publisher.placeGermanyen_US
dc.identifier.scopusauthoridChan, PPF=52563246100en_US
dc.identifier.scopusauthoridHui, LCK=8905728300en_US
dc.identifier.scopusauthoridYiu, SM=7003282240en_US

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats