A method for detecting the theft of Java']Java programs through analysis of the control flow information

被引:34
作者
Lim, Hyun-il [1 ]
Park, Heewan [1 ]
Choi, Seokwoo [1 ]
Han, Taisook [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Div Comp Sci, Taejon 305701, South Korea
关键词
Software birthmark; Software copyright protection; Software theft detection; !text type='Java']Java[!/text] bytecode analysis;
D O I
10.1016/j.infsof.2009.04.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A software birthmark refers to the inherent characteristics of a program that can be used to identify the program. In this paper, a method for detecting the theft of Java programs through a static software birthmark is proposed that is based on the control flow information. The control flow information shows the structural characteristics and the possible behaviors during the execution of program. Flow paths (FP) and behaviors in Java programs are formally described here, and a set of behaviors of FPs is used as a software birthmark. The similarity is calculated by matching the pairs of similar behaviors from two birthmarks. Experiments centered on the proposed birthmark with respect to precision and recall. The performance was evaluated by analyzing the F-measure curves. The experimental results show that the proposed birthmark is a more effective measure compared to earlier approaches for detecting copied programs. even in cases where such programs are aggressively modified. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1338 / 1350
页数:13
相关论文
共 39 条
[21]   Detecting theft of Java']Java applications via a static birthmark based on weighted stack patterns [J].
Lim, Hyun-il ;
Park, Heewan ;
choi, Seokwoo ;
Han, Taisook .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (09) :2323-2332
[22]  
Myles G., 2005, P 2005 ACM S APPL CO, P314, DOI [10.1145/1066677.1066753, DOI 10.1145/1066677.1066753]
[23]  
PARK H, 2008, LECT NOTES COMPUTER, V5312
[24]  
PARK H, 2008, 6 IEEE INT C IND INF
[25]  
PARK H, 2008, 6 IEEE INT C IND INF, V5312
[26]  
Prechelt L, 2002, J UNIVERS COMPUT SCI, V8, P1016
[27]  
PRECHELT L, 2000, 20001 U KARLSR FAK I, P44
[28]  
QU G, 2000, P 3 INT WORKSH INF H
[29]   Understanding inverse document frequency: on theoretical arguments for IDF [J].
Robertson, S .
JOURNAL OF DOCUMENTATION, 2004, 60 (05) :503-520
[30]  
Salton G., 1986, Introduction to Modern Information Retrieval