Lecture Notes in Computer Science, Vol.7025 is the conference proceedings of the CMS 2011Code theft has been a serious threat to the survival of the software industry. A dynamic software birthmark can help detect code theft by comparing the intrinsic characteristics of two programs extracted during their execution. We propose a dynamic birthmark system for Java based on the object reference graph. To the best of our knowledge, it is the first dynamic software birthmark making use of the heap memory. We evaluated our birthmark using 25 large-scale programs with most of them of tens of megabytes in size. Our results show that it is effective in detecting partial code theft. No false positive or false negative were found. More importantly, the...
AbstractThis paper presents a novel dynamic analysis approach to software plagiarism detection. Such...
Software theft has become a very serious threat to both the software industry and individual softwar...
Java birthmark toolkit, detecting the software theft by native characteristics of the programs
Abstract. Code theft is a threat for companies that considers code as a core asset. A birthmark can ...
Abstract—As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to...
To support the efficient detection of theft of Java class files, this paper presents a new method to...
This paper presents a technique of dynamic software birthmarks to support efficient detection of sof...
A software birthmark means inherent characteristics that can be used to identify a program. In this ...
A software birthmark means inherent characteristics that can be used to identify a program. In this ...
To detect the theft of Java class files efficiently, we propose a concept of Java birthmarks, which ...
Static and dynamic program analysis techniques are important research areas in software security. St...
JavaScript is currently the dominating client-side scripting language in the web community. However,...
This paper proposes dynamic software birthmarks which can be extracted during execution of Windows a...
Software plagiarism seriously impedes the healthy development of open source software. To fight agai...
There are at least four U.S. patents on software wa-termarking, and an idea for further advancing th...
AbstractThis paper presents a novel dynamic analysis approach to software plagiarism detection. Such...
Software theft has become a very serious threat to both the software industry and individual softwar...
Java birthmark toolkit, detecting the software theft by native characteristics of the programs
Abstract. Code theft is a threat for companies that considers code as a core asset. A birthmark can ...
Abstract—As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to...
To support the efficient detection of theft of Java class files, this paper presents a new method to...
This paper presents a technique of dynamic software birthmarks to support efficient detection of sof...
A software birthmark means inherent characteristics that can be used to identify a program. In this ...
A software birthmark means inherent characteristics that can be used to identify a program. In this ...
To detect the theft of Java class files efficiently, we propose a concept of Java birthmarks, which ...
Static and dynamic program analysis techniques are important research areas in software security. St...
JavaScript is currently the dominating client-side scripting language in the web community. However,...
This paper proposes dynamic software birthmarks which can be extracted during execution of Windows a...
Software plagiarism seriously impedes the healthy development of open source software. To fight agai...
There are at least four U.S. patents on software wa-termarking, and an idea for further advancing th...
AbstractThis paper presents a novel dynamic analysis approach to software plagiarism detection. Such...
Software theft has become a very serious threat to both the software industry and individual softwar...
Java birthmark toolkit, detecting the software theft by native characteristics of the programs