Feature selection for software birthmark based on cluster analysis

被引:0
作者
Luo, Yang-Xia [1 ,2 ]
Fang, Ding-Yi [2 ]
机构
[1] School of Information, Xi'an University of Finance and Economics, Xi'an
[2] School of Information Science and Technology, Northwest University, Xi'an
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2013年 / 41卷 / 12期
关键词
Birthmark feature selection; Clustering analysis; Correlation coefficient; Information measurement;
D O I
10.3969/j.issn.0372-2112.2013.12.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The feature selection for software birthmark has a direct bearing on software recognition rate. We apply constrained clustering to analyze software features. The within-and between-class distances of features are measured based on mutual information. Information gain and penalty functions are constructed using homogeneous and heterogeneous software features respectively. Then the software birthmark features with high class distinction and minimum redundancy are selected. It is shown the algorithm provide an effective approach for software birthmark feature selection and optimization by analysis and comparison.
引用
收藏
页码:2334 / 2338
页数:4
相关论文
共 12 条
  • [1] Mahmood Y., Sarwar S., Pervez Z., Et al., Method based static software birthmarks: A new approach to derogate software piracy, Proceedings of the 2nd International Conference on Computer, Control and Communication, pp. 149-155, (2009)
  • [2] Xin Z., Chen H., Wang X., Et al., Replacement attacks on behavior based software birthmark, Information Security, 11, 5, pp. 1-16, (2011)
  • [3] Myles G., Collberg C., K-gram based software birthmarks, Proceedings of the Symposium on Applied Computing, pp. 314-318, (2005)
  • [4] Lu B., Liu F., Ge X., Et al., Feature n-gram set based software zero-watermarking, Proceedings of the International Symposiums on Information Processing, pp. 607-611, (2008)
  • [5] Danicic S., Hierons R.M., Laurence M.R., On the computational complexity of dynamic slicing problems for program schemas, Mathematical Structures in Computer Science, 21, 6, pp. 1339-1362, (2011)
  • [6] Liu W.-W., Shi Y., Guo Y., Et al., A malicious code detection method based on integrated bethavior characterization, Acta Electronica Sinica, 37, 4, pp. 696-700, (2009)
  • [7] Tamada H., Okamoto K., Nakamura M., Et al., Dynamic software birthmarks to detect the theft of windows applications, Proceedings of the 8th International Symposium on Future Software Technology, pp. 37-43, (2004)
  • [8] Proietti M., Pettorossi A., Semantics preserving transformation rules for Prolog, Proceedings of the SIGPLAN symposium on Partial Evaluation and Semantics-based Program Manipulation, pp. 274-284, (1991)
  • [9] Tamada H., Nakamura M., Monden A., Et al., Design and evaluation of birthmarks for detecting theft of java programs, Proceedings of the International Conference on Software Engineering, pp. 569-575, (2004)
  • [10] Bao M., Guan L.-Y., Li X.-D., Et al., A study on optimum classification character based on the distributive entropy of euclidian distance, Acta Electronica Sinica, 35, 3, pp. 469-473, (2007)